Author : Supriya.B.N 1
Date of Publication :30th November 2017
Abstract: It explains about how to secure computer networks, the network security mainly includes “cybercrime technology†and “hacking†.some hackers will damages the web server and replace their logo with pornography, they will hack e-mails, credit card number through online shopping sites. This paper addresses the ethical hackers: their skills, attitudes etc. The hacker should have the brilliant mind to hack anything, some rules he should follow to become an ethical hacker called as “penetrate testingâ€. The rules consist the knowledge of HTML, javascript, computer tricks, breaking, cracking etc. WSN’s having many types of attacks because it deployed in the open and unprotected environment. So that we are using one algorithm to detect the attack called as “selective forwarding attack†and it damaged attacks in multi-hop routing protocols. Detection algorithm based only on the neighbourhood details and it detects SFA’s with high accuracy. like this, we can detect attacks and provide security for the system. Network security is the main issue of computing because types of attacks are increasing day by day. The malicious nodes create a problem in the network. So we have to provide network security elements such as confidentiality, integrity and availability and these vectors.
Reference :
-
- A. Anton, J. Earp, and J. Young. How internet users‟ privacy concernshave evolved since 2002. Security Privacy, IEEE, 8(1):21 –27, Jan-Feb2010.
- Bo Yu, and Bin Xiao, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks", Proc. 20th International Parallel and Distributed Processing Symposium IPDPS 2006 (SSN2006), Page(s):1 – 8, Greece, 25- 29April 2006
- Tran Hoang Hai and Euinam Huh “Detecting selective forwarding attacks in wireless sensor networks using twohop neighbor knowledge” In NCA, pages 325– 331, 2008.
- Jeremy Brown and Xiaojiang Du “Detection of selective forwarding attacks in heterogeneous sensor networks” In ICC, pages 1583–1587, 2008.
- Teng, L., and Zhang, Y. (2010). Secure Routing Algorithm against Sinkhole attack for Mobile Wireless Sensor Network, In Computer Modeling and Simulation, 2010. ICCMS‟10. Second International Conference on (Vol. 4 pp.79-82). IEEE..
- DOC, 2002. US Department of Commerce, Export Administration Regulations (EAR), 15 C.F.R. Parts 730- 774. Sections 740.13, 740.17 and 742.15 are the principal references for the export of encryption items.
- DOD, 2002. Department of Defense Education Activity Internal Physical Security. Department of Defense. DoDEA Regulation 4700.2
- A Study Of Network Security Using Penetration Testing by R. Shanmugapriya.
- Tran Hoang Hai and Eui-Nam Huh, Detecting Selective Forwarding Attack in Wireless Sensor Networks using TwoHops Neighbour Knowledge, 7th IEEE International Symposium on Network Computing and Applications, 2008, 325-331.