Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 24
Page No. 7494 - 7500

Network Security: Internal and External Attacks

Authors : Ujjwal Sharma, Princi Sharma, Vivek Rawal and Priti Narwal

References

Cook, W.R. and S. Rai, 2005. Safe query objects: Statically typed objects as remotely executable queries. Proceedings of the 27th International Conference on Software Engineering, May 15-21, 2005, ACM, St. Louis, Missouri, ISBN:1-58113-963-2, pp: 97-106.

Daya, B., 2013. Network security: History, importance and future. University of Florida: Electrical and Computer Engineering, Gainesville, Florida. http://www.alphawireless.co.za/wp-content/uploads/2013/01/Network-Security-article.pdf

Desai, N., 2003. Intrusion prevention systems: The next step in the evolution of IDS. Symantec, Mountain View, California. https://www.symantec.com/connect/articles/intrusion-prevention-systems-next-step-evolution-ids

Deshmukh, R.V. and K.K. Devadkar, 2015. Understanding ddos attack and its effect in cloud environment. Procedia Comput. Sci., 49: 202-210.
Direct Link  |  

Dharmapurikar, S., P. Krishnamurthy, T. Sproull and J.W. Lockwood, 2004. Deep packet inspection using parallel bloom filters. IEEE Microbiol., 24: 52-61.
Direct Link  |  

Grossman, J., 2006. Cross-site scripting worms and viruses. White hat, Pasay, Philippines. http://s3.amazonaws.com/academia.edu.documents/6784491/wp5css0607.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1493814150&Signature=6XMAEfAlwRW62wDo6mbu7pm3wDw%3D&response-content-disposition=inline%3B%20filename%3DCross

Halfond, W.G., J. Viegas and A. Orso, 2006. A classification of SQL-injection attacks and countermeasures. Proceedings of the IEEE International Symposium on Secure Software Engineering, March 13-15, 2006, Washington, DC., USA -.

Huang, Y.W., S.K. Huang, T.P. Lin and C.H. Tsai, 2003. Web application security assessment by fault injection and behavior monitoring. Proceedings of the 12th International Conference on World Wide Web, May 20-24, 2003, ACM, Budapest, Hungary, ISBN:1-58113-680-3, pp: 148-159.

Huang, Y.W., S.K. Huang, T.P. Lin and C.H. Tsai, 2003. Web application security assessment by fault injection and behavior monitoring. Proceedings of the 12th International Conference on World Wide Web, May 20-24, 2003, ACM, Budapest, Hungary, ISBN:1-58113-680-3, pp: 148-159.

Javitz, H.S. and A. Valdes, 1994. The NIDES statistical component: Description and justifi-cation. Technical Report, Computer Science Laboratory, SRI International, Menlo Park, California.

Knox, E.M. and R.T. Ng, 1998. Algorithms for mining distancebased outliers in large datasets. Proceedings of the 24th VLDB International Conference on Very Large Data Bases, August 24-27, 1998, VLDB, New York, USA., pp: 392-403.

McClure, R.A. and I.H. Kruger, 2005. SQL DOM: Compile time checking of dynamic SQL statements. Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), May 15-21, 2005, IEEE, California, USA., ISBN:1-59593-963-2, pp: 88-96.

Rad, B.B., M. Masrom and S. Ibrahim, 2011. Evolution of computer virus concealment and anti-virus techniques: A short survey. Int. J. Comput. Sci. Issues, 8: 113-121.
Direct Link  |  

Ramaswamy, S., R. Rastogi and K. Shim, 2000. Efficient algorithms for mining outliers from large data sets. Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data Vol. 29, May 15-18, 2000, ACM, Dallas, Texas, ISBN:1-58113-217-4, pp: 427-438.

Verma, A., M.S. Rao, A.K. Gupta, W. Jeberson and V. Singh, 2013. A literature review on malware and its analysis. Intl. J. Current Res. Rev., 5: 71-71.
Direct Link  |  

Weinsberg, Y., S.T. David, D. Dolev and T. Anker, 2006. High performance string matching algorithm for a Network Intrusion Prevention System (NIPS). Proceedings of the 2006 Workshop on High Performance Switching and Routing, June 7-9, 2006, IEEE, Jerusalem, Israel, ISBN:0-7803-9569-7, pp: 1-7.

Yu, F., R.H. Katz and T.V. Lakshman, 2004. Gigabit rate packet pattern-matching using TCAM. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), October 8, 2004, IEEE, Berkeley, California, ISBN:0-7695-2161-4, pp: 174-183.

Zalavadia, B., 2014. Network security issues and solutions. Intl. J. Comput. Sci. Eng. Technol., 5: 621-624.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved