A Result Paper-Network Vulnerability Detection
Keywords:
hackers and intruders, sand web services, intrusive dataAbstract
Security of the information in the computer networks has been one of the most important Research Area. Objective of research is to preserves the secure condition it is essential to be aware of the behavior of the incoming data. It is a too vulnerable and complicated Question. Owing to the fact that intrusive data are in several and similar forms, distinguishing them from the normal ones is so astounding. Network Security is becoming an important issue for all the organizations, and with the increase in knowledge of hackers and intruders they have made many successful attempts to bring down high-profile company University network sand web services.
References
Introduction to Network Security, Dr. Rahul Banerjee, BITS-Pilani, India www.discovery.bits pilani.ac.in/rahul/CompNet/index.htm
http://www.cert.org/tech tips/homeUniversitynetworks.html
A Brief History of Network Security and the N d for Adherence to the Software Process Model, by Paul Innella, www.tdisecur .com/resources/assets/NetSec.pdf
Network Security fundamentals, By Gert De Laet, Gert Schauwers, Cisco press.
] Network Attack nd Defence, By Roger Needham and Butler Lamson. www.cl.cam.ac.uk/ rja14/Papers/SE-18.pdf
Ecient countermeasures for software vulnerabilities due to memory manage-ment errors,Prof. Dr. ir. W. JOOSEN, Prof. Dr. ir. F. PIESSENS.
Computer Vulnerabilities, Written by Eric Knight, C.I.S.S.P. Original Publication: March 6, 2000.www.ussrback.com/docs/papers/general/compvulndraf t.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.