IDEAS home Printed from https://ideas.repec.org/a/igg/jse000/v8y2017i2p62-75.html
   My bibliography  Save this article

Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Author

Listed:
  • Nachiket Athavale

    (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India)

  • Shubham Deshpande

    (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India)

  • Vikash Chaudhary

    (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India)

  • Jatin Chavan

    (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India)

  • S. S. Barde

    (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India)

Abstract

Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also, the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to ours. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.

Suggested Citation

  • Nachiket Athavale & Shubham Deshpande & Vikash Chaudhary & Jatin Chavan & S. S. Barde, 2017. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols," International Journal of Synthetic Emotions (IJSE), IGI Global, vol. 8(2), pages 62-75, July.
  • Handle: RePEc:igg:jse000:v:8:y:2017:i:2:p:62-75
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJSE.2017070105
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jse000:v:8:y:2017:i:2:p:62-75. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.