Open Access Open Access  Restricted Access Subscription Access

Server Intrusion Protection System


Affiliations
1 Department of Information Technology, Smt. Radhikatai Pandav College of Engineering, Nagpur, India
 

The dramatic growth of usage of HTTP, FTP, SSH, SFTP, email, online data banks, online data storage, online gaming then on leads us to higher usage of network terminal IPV4 and IPV6 which needs certain protocols of configuration without which the system won’t run and obtain hacked. Those protocols or measures are named as Server security system or in non-technical manner Anti Hacking Tricks. These protocols are basic requirement of every and each system or server where data is stored or getting accessed by public through there user details. because the network protocols are becoming advanced by new cyber security flaws, security system is getting advanced by an equivalent amount. during this paper we are getting to see the methodologies used for securing the server from unauthorized access by third party and destroying our data.
User
Notifications
Font Size

  • Limei Ma; Dongmei Zhao; Yijun Gao; Chen Zhao, “Research on SQL Injection Attack and Prevention Technology Based on Web”, International Conference on Computer Network, Electronic and Automation (ICCNEA), IEEE Xplore, 27-29 Sept. 2019.
  • Hussein Lema; Fatuma Simba; Abdulla Ally, “Preventing Utilization of Shared Network Resources by Detecting IP Spoofing Attacks through Validation of source IP Address”, IST-Africa Week Conference (IST-Africa), IEEE Xplore, 9-11 May 2018.
  • Mohamed Torky; Ali Meligy; Hani Ibrahim, “Securing Online Social Networks against bad Bots based on a Necklace CAPTCHA approach”, 12th International Computer Engineering Conference (ICENCO), IEEE Xplore, 28-29 Dec. 2016.
  • T. Indhumathi; R. Harshini; S. Janani; S. Navaneetha, “An efficient scheme for identifying spam bots and terminate mailing”, Second International Conference on Science Technology Engineering and Management (ICONSTEM), IEEE Xplore, 30-31 March 2016.
  • Abdullah Aydeger; Mohammad Hossein Manshaei; Mohammad Ashiqur Rahman; Kemal Akkaya, “Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach”, IEEE Transactions on Network Science and Engineering, Volume: 8, Issue: 1, Jan.-March 1 2021, PP 751 – 764.
  • Sujatha Sivabalan; P J Radcliffe, “A novel framework to detect and block DDoS attack at the application layer”, IEEE 2013 Tencon – Spring, IEEE Xplore, 17-19 April 2013.
  • Ajit Patil; Aishwarya Laturkar; S. V. Athawale; Rutuja Takale; Priya Tathawade, “A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security”, International Conference on Information, Communication, Instrumentation and Control (ICICIC), IEEE Xplore, 17-19 Aug. 2017.
  • P. Pandiaraja; J. Manikandan, “Web proxy-based detection and protection mechanisms against client-based HTTP attacks”, International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], IEEE Xplore, 19-20 March 2015.

Abstract Views: 118

PDF Views: 87




  • Server Intrusion Protection System

Abstract Views: 118  |  PDF Views: 87

Authors

Nikita S. Nandapure, Madhuri R. Charpe Pratiksha M. Hatekar, Akshay O. Sakhre
Department of Information Technology, Smt. Radhikatai Pandav College of Engineering, Nagpur, India

Abstract


The dramatic growth of usage of HTTP, FTP, SSH, SFTP, email, online data banks, online data storage, online gaming then on leads us to higher usage of network terminal IPV4 and IPV6 which needs certain protocols of configuration without which the system won’t run and obtain hacked. Those protocols or measures are named as Server security system or in non-technical manner Anti Hacking Tricks. These protocols are basic requirement of every and each system or server where data is stored or getting accessed by public through there user details. because the network protocols are becoming advanced by new cyber security flaws, security system is getting advanced by an equivalent amount. during this paper we are getting to see the methodologies used for securing the server from unauthorized access by third party and destroying our data.

References