Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study of Network Attacks and Features of Secure Protocols


Affiliations
1 Shri Shankaracharya Mahavidyalaya, Junwani, Bhilai, India
2 MATS University, Raipur, India
     

   Subscribe/Renew Journal


Remote protocols are essential part of the computer network systems. Since data or information is sent from one system to another, there arise many issues regarding security and the validation of this information. This paper aims to explain the basic outlook of the security measures. Every protocol which are implemented commonly are vulnerable and there are various threats that act against privacy, data integrity, availability of service, etc. It is important to have knowledge and security experiences about secure protocols. This Study contains features of the designed secure protocols. Every new protocol should meet or at least should address described issues like secure protocol does. This can be used to safeguard the existing computer networks.

Keywords

Network Attacks, Secure Protocols, Security Measures, Cryptography, Denial-of-Service.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 256

PDF Views: 1




  • A Study of Network Attacks and Features of Secure Protocols

Abstract Views: 256  |  PDF Views: 1

Authors

J. Durga Prasad Rao
Shri Shankaracharya Mahavidyalaya, Junwani, Bhilai, India
Sankalp Rai
MATS University, Raipur, India
Bhavana Narain
MATS University, Raipur, India

Abstract


Remote protocols are essential part of the computer network systems. Since data or information is sent from one system to another, there arise many issues regarding security and the validation of this information. This paper aims to explain the basic outlook of the security measures. Every protocol which are implemented commonly are vulnerable and there are various threats that act against privacy, data integrity, availability of service, etc. It is important to have knowledge and security experiences about secure protocols. This Study contains features of the designed secure protocols. Every new protocol should meet or at least should address described issues like secure protocol does. This can be used to safeguard the existing computer networks.

Keywords


Network Attacks, Secure Protocols, Security Measures, Cryptography, Denial-of-Service.