CFP last date
22 April 2024
Reseach Article

Network Attacks and Their Detection Mechanisms: A Review

by Nikhil S. Mangrulkar, Arvind R. Bhagat Patil, Abhijit S. Pande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 9
Year of Publication: 2014
Authors: Nikhil S. Mangrulkar, Arvind R. Bhagat Patil, Abhijit S. Pande
10.5120/15606-3154

Nikhil S. Mangrulkar, Arvind R. Bhagat Patil, Abhijit S. Pande . Network Attacks and Their Detection Mechanisms: A Review. International Journal of Computer Applications. 90, 9 ( March 2014), 37-39. DOI=10.5120/15606-3154

@article{ 10.5120/15606-3154,
author = { Nikhil S. Mangrulkar, Arvind R. Bhagat Patil, Abhijit S. Pande },
title = { Network Attacks and Their Detection Mechanisms: A Review },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 9 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number9/15606-3154/ },
doi = { 10.5120/15606-3154 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:37.988416+05:30
%A Nikhil S. Mangrulkar
%A Arvind R. Bhagat Patil
%A Abhijit S. Pande
%T Network Attacks and Their Detection Mechanisms: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 9
%P 37-39
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the development of large open networks, security threats for the network have increased significantly in the past few years. Different types of attacks possess different types of threats to network and network resources. Many different detection mechanisms have been proposed by various researchers. This paper reviews different type of possible network attacks and detection mechanisms proposed by various researchers that are capable of detecting such attacks.

References
  1. N. Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, C. Charnsripinyo, "A Practical Network-based Intrusion Detection and Prevention System", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
  2. Monowar H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, "Network Anomaly Detection: Methods, Systems and Tools", IEEE Communications Surveys & Tutorials, 2013.
  3. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda and Ren Ping Liu, "Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
  4. A. Kumaravel, M. Niraisha, "Multi-Classification Approach for Detecting Network Attacks", Proceedings of IEEE Conference on Information and Communication Technologies, 2013.
  5. Risto Vaarandi, "Detecting Anomalous Network Traffic in Organizational Private Networks", IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, San Diego, 2013.
  6. Shin-Ying Huang, Yen-Nun Huang, "Network traffic anomaly detection based on growing hierarchical SOM", IEEE/IFIP 43rd Annual International Conference on Dependable Systems and Networks, 2013
  7. Zhengmin Xia, Songnian Lu and Jianhua Li, "DDoS Flood Attack Detection Based On Fractal Parameters", 8th International Conference on Wireless Communications, Networking and Mobile Computing, 2012.
  8. Jeyanthi N, Vinithra J,Sneha, Thandeeswaran R and N. Ch. Sriman NarayanaIyengar, "A Recurrence Quantification Analytical approach to Detect DDoS Attacks", International Conference on Computational Intelligence and Communication Systems, 2011.
  9. B. S. Kiruthika Devi, G. Preetha, S. Mercy Shalinie, "DDoS Detection using Host-Network based Metrics and Mitigation in Experimental Testbed", ICRTIT, 2012.
  10. Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu, "Detecting latent attack behavior from aggregated Web traffic", Computer Communications 36, Pg. 895–907, 2013.
  11. P. Jongsuebsuk, N. Wattanapongsakorn, C. Charnsripinyo, "Network Intrusion Detection with Fuzzy Genetic Algorithm for Unknown Attacks", IEEE International Conference on Information Networking, 2013.
  12. Ahmad Sanmorino, Setiadi Yazid, "DDoS Attack Detection Method and Mitigation Using Pattern of the Flow", IEEE International Conference of Information and Communication Technology, 2013.
  13. Sumaiya Thaseen, Ch. Aswani Kumar, "An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System", Proceedings ofIEEE International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
  14. Kapil Wankhade, Sadia Patka, Ravinrda Thool, "An Overview of Intrusion Detection Based on Data Mining Techniques", IEEE International Conference on Communication Systems and Network Technologies, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Attack detection detection mechanisms