Dr.G.Manoj Someswar, Chaitrashree. V, Gagana M.S, Kavyashree E.D, Deepthi Wilson, Manju Prasad B


Security in a network plays the vital role in the information security, and it inhibits from various types of attacks rising day by day. Cryptography is the foremost technology which is significant in maintaining the network security.  Building the network is not the immense task for network administrators but maintenance of the network is the big undertaking.To provide safety to the system various tools, prevention methods, encryption, decryption, authentication factor are used. This research paper focuses on various malicious software that alters the network security and also some of the tips that are needed to secure the network.

Full Text:



Simmonds, A; Sandilands, P; van Ekert, L(2004) ―Ontology for Network Security Attacks‖ Lecture Notes in Computer Science 3285 pp.317-323.

A Role-Based Trusted Network Provides Pervasive Security and Compliance – interview with Jayshree Ullal, senior VP of Cisco.

DayeDittrich, Network monitoring/Intrusion Detection System(IDS), University of Washington.

William Stallings, ―Cryptography and Network Security‖, Vth edition.

Technet, [Online], Available- http://technet.microsoft.com, Accessed on [20 August 2016]

E-Computer Notes, [Online] , Available- http://ecomputernotes.com, Accessed on [20 August 2016]

Siddharth Ghansela ,”Network Security: Attacks, Tools and Techniques”, Volume 3, Issue 6, June 2013.

Inam Mohammad, Rashi Pandey, Aashiya Khatoon,”A Review of types of Security Attacks and Malicious Software in Network Security”, Volume 4, Issue 5, May 2014.

Chen S., Iyer R., and Whisnant K., " Evaluating the Security Threat of Firewall Data Corruption Caused by Instruction Transient Errors," In Proceedings of the 2002 International Conference on Dependable Systems & Network, Washington, D.C., 2002.

Kim H., "Design and Implementation of a Private and Public Key Crypto Processor and Its Application to a Security System," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, FEBRUARY 2004.

Pcmag Encyclopedia term, available-Pcmag.com, Accessed on [20 August 2016].


  • There are currently no refbacks.