Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks
Supriya Gupta | Ankur Goyal 
Abstract: Over the past several years, uses of networks-based services and users of the Internet have gain tremendous growth to exchange information without any distance barrier. However, such network is most popular for fast and easy process to exchange information over the long distance but the safety and security of long-distance communication remains an issue in the case of confidential data. Day by day with the growth of computer networks, number of attacks has comes in new form to impacting availability, confidentiality, and integrity of critical data that poses a serious problem for their detection and exploits safety vulnerabilities. On the other hand human labeling of the available network audit data instances is usually tedious, time consuming and expensive. Therefore it is essential for a system administrator that he/she use one or more security tools to protect information from passing before curious eyes or, more importantly, from falling into wrong hands. In this paper, we present a current investigation of the network security system, which may help to the researchers to better understand the pitfalls of accessible security systems and to build a more secure data security mechanism.
Keywords: Attacks, Network Security, Anomaly Detection, Misuse Detection
Edition: Volume 3 Issue 11, November 2014,
Pages: 3151 - 155
How to Cite this Article?
Supriya Gupta, Ankur Goyal, "A Survey: Recent Autonomous Security Techniques for Detection & Avoidance of Network Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB14112, Volume 3 Issue 11, November 2014, 3151 - 155, #ijsrnet
How to Share this Article?
Similar Articles with Keyword 'Attacks'
Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar | Mohan K 
Comprehensive Research on Cyber - Attacks and Cyber Security