Open Access Open Access  Restricted Access Subscription or Fee Access

Computing the Activity of Connecting Computers in Network Security

K. Sekar, Dr.K. Thangadurai

Abstract


Network security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your network system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your network to attack other systems, sending forged email from your computer, or examining personal information stored on your network.

Keywords


NAT, TCP, UDP, DNS, SSH, POP3, IMAP, SMTP

Full Text:

PDF

References


S. Floyd and V. Jacobson, ―Random early detection gateways for congestion avoidance‖, IEEE/ACM Trans. Networking

Shan Suthaharan, ―Reduction of queue oscillation in the next generation Internet routers‖, Science Direct, Computer Communication, 2007

K.Chitra, G.Padamavathi, ―Classification and Performance of AQM-Based Schemes for Congestion Avoidance ― , April 2010

C. Ababei, H. Mogal, and K. Bazargan, ―Three-dimensional Place and Route for FPGAs,‖ Proc. IEEE/ACM Asia and South Pacific Design Automation Conference

V. Betz and J. Rose, ―VPR: A new Packing Placement and Routing Tool for FPGA Research‖, Field Programmable Logic App

C. Ebeling, L. McMurchie, S.A. Hauck, and S. Burns, ―Placement and Routing Tools for Triptych FPGA,‖ IEEE Tans. VLSI Systems

M.J. Alexander, ―High Performance routing for FPGAs‖, A Doctoral Thesis , University of Virginia, 1996.

Iustin Priescu et al.,‖Research Rezults of a Network Security Perimeter for Romanian E-Commerce Companies‖

http://www.gpec.ro/ro/conferintele-gpec-2010, 2010

http://www.sans.org/top-cyber-security-risks, 2009




DOI: http://dx.doi.org/10.36039/AA052011007

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.