Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 9
Year of Publication: 2014
![]() |
10.5120/15606-3154 |
Nikhil S Mangrulkar, Arvind Bhagat R Patil and Abhijit S Pande. Article: Network Attacks and Their Detection Mechanisms: A Review. International Journal of Computer Applications 90(9):37-39, March 2014. Full text available. BibTeX
@article{key:article, author = {Nikhil S. Mangrulkar and Arvind R. Bhagat Patil and Abhijit S. Pande}, title = {Article: Network Attacks and Their Detection Mechanisms: A Review}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {90}, number = {9}, pages = {37-39}, month = {March}, note = {Full text available} }
Abstract
With the development of large open networks, security threats for the network have increased significantly in the past few years. Different types of attacks possess different types of threats to network and network resources. Many different detection mechanisms have been proposed by various researchers. This paper reviews different type of possible network attacks and detection mechanisms proposed by various researchers that are capable of detecting such attacks.
References
- N. Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, C. Charnsripinyo, "A Practical Network-based Intrusion Detection and Prevention System", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
- Monowar H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, "Network Anomaly Detection: Methods, Systems and Tools", IEEE Communications Surveys & Tutorials, 2013.
- Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda and Ren Ping Liu, "Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
- A. Kumaravel, M. Niraisha, "Multi-Classification Approach for Detecting Network Attacks", Proceedings of IEEE Conference on Information and Communication Technologies, 2013.
- Risto Vaarandi, "Detecting Anomalous Network Traffic in Organizational Private Networks", IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, San Diego, 2013.
- Shin-Ying Huang, Yen-Nun Huang, "Network traffic anomaly detection based on growing hierarchical SOM", IEEE/IFIP 43rd Annual International Conference on Dependable Systems and Networks, 2013
- Zhengmin Xia, Songnian Lu and Jianhua Li, "DDoS Flood Attack Detection Based On Fractal Parameters", 8th International Conference on Wireless Communications, Networking and Mobile Computing, 2012.
- Jeyanthi N, Vinithra J,Sneha, Thandeeswaran R and N. Ch. Sriman NarayanaIyengar, "A Recurrence Quantification Analytical approach to Detect DDoS Attacks", International Conference on Computational Intelligence and Communication Systems, 2011.
- B. S. Kiruthika Devi, G. Preetha, S. Mercy Shalinie, "DDoS Detection using Host-Network based Metrics and Mitigation in Experimental Testbed", ICRTIT, 2012.
- Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu, "Detecting latent attack behavior from aggregated Web traffic", Computer Communications 36, Pg. 895–907, 2013.
- P. Jongsuebsuk, N. Wattanapongsakorn, C. Charnsripinyo, "Network Intrusion Detection with Fuzzy Genetic Algorithm for Unknown Attacks", IEEE International Conference on Information Networking, 2013.
- Ahmad Sanmorino, Setiadi Yazid, "DDoS Attack Detection Method and Mitigation Using Pattern of the Flow", IEEE International Conference of Information and Communication Technology, 2013.
- Sumaiya Thaseen, Ch. Aswani Kumar, "An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System", Proceedings ofIEEE International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
- Kapil Wankhade, Sadia Patka, Ravinrda Thool, "An Overview of Intrusion Detection Based on Data Mining Techniques", IEEE International Conference on Communication Systems and Network Technologies, 2013.