e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:03/Issue:03/March-2021
Impact Factor- 5.354
www.irjmets.com
A REVIEW ON DIFFERENT ATTACKS AND WAYS TO MITIGATE THEM IN ORDER TO ENHANCE NETWORK SECURITY Roman Noori*1, Er. Jasdeep Singh*2 *1RIMT
*2Assistant
University, Mandi Gobindgarh, Punjab, India
Professor, Computer Science and Engineering, RIMT University, Mandi Gobindgarh,
Punjab, India.
ABSTRACT Network Security is becoming very important in today's world, as a result of which different methods are used to exploit it. Network engineers need to keep up with recent advances in both hardware and software fields to prevent them from being used, along with user data. Network security is increasingly drawing people's attention. This paper briefly discusses the idea about network security and the need for network security, but also the different methods of attack and defence against it. Keywords: Network Security, Network Security Factor, Security Risks, DOS Attacks, MITM, Spoofing, Firewalls, Encryption, Port Scanning, SSL, HTTPS, VPN.
I.
INTRODUCTION
Fast access to information on the Internet has become increasingly essential for rising businesses. As businesses continue to disperse different business functions to the generic network, measures are required to ensure that their network has not been tampered with or has not collapsed. If a network is accessed by a hacker or a disgruntled employee, it may demolish confidential data for the corporation, adversely impact the competitiveness of the company and delay the ability to compete with other companies. Unauthorized access to the network may also damage the relationship between the company and customers and business associates, who may doubt the company's ability to protect their confidential information. In addition, any part of the network may be vulnerable to attacks or unauthorized actions, as indicated above. Company competitors or even company staff may break all switches and hosts of routers. In order to decide on the best ways to protect the assets of an organization from attackers, the Information Technology Manager of that company should consider the threats. that may be triggered and the damage that may be caused to the business infrastructure. A network contains many vulnerabilities, but most of them can be addressed by following very basic procedures, such as upgrading software and correctly configuring network and firewall rules, using good anti-virus software, etc. Figure 1: Mobile Ad hoc Network [1]
Figure 1: Mobile Ad hoc Network [1]
II. NEED OF NETWORK SECURITY Today, the network model requires protection from attackers and hackers. Network security consists of two specific securities. 1. Data Security-Securing information from security breaches and loss. www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[337]