Network Security Research Paper
Network Security Research Paper
α
Suyog Dixitª and Pankaj Kumar Jha
B.E. Computer Science, Third year, SD Bansal College of Technology, Indore (M.P.)
a
B.E Computer Science, Second year, SD Bansal College of Technology, Indore (M.P.)
α
Email: [email protected]
Short-term reconstitution is the set of first steps taken to Along with the sharing of information, system
meet the most urgent threats to life and property. administrators also need procedures they can use to assist in
They include assessing damage and implementing an ending attacks already under way. This need is particularly
appropriate recovery plan. Systems are restored from evident in DoS attacks, which can be of extended duration
backups where possible, and residual resources may have to and which can shut down business operations while they
be rationed. It is possible that additional capacity can be occur. To aid in ending an attack, system administrators
generated as facilities that are idle or in maintenance are would profit by working with infrastructure operators to
brought on line. Online status reporting, dispatching of trace the attack to its source and then to block the attacker.
emergency personnel and repair equipment, notification of Methods for halting attacks in progress as well as those for
users of possibly lost transactions, an ability to adjust plans investigating attacks are constrained by the inability to easily
in near-real time, and procedures for secure emergency identify and locate attackers. In the case of the Internet,
communication will be required. because packet source addresses are easily forged, the only
way to identify an attacker with confidence is to trace the
path taken by the packet through the routing infrastructure.
IMPROVING DEFENDER PERFORMANCE This tracing is a manual process and essentially requires the
cooperation of every network operator between the attacker
A current management paradigm asserts that organizations and his target. The inability to automatically trace the source
must learn from experience. Even under the best of of an attack in real-time significantly impairs the ability of
circumstances, events often unfold unpredictably. Social and targets and law enforcement agencies to respond to
technological change may also diminish an organization’s incidents.
present effectiveness. Recognizing this, there are two
responses. The first response is to recognize the possibility
that the network system could fail in several ways. Initial
design of new systems, or upgrades of existing systems,
should include thorough analysis to identify potential flaws
an attacker could exploit.
Armageddon’08 April 01, 2008 Warfare: Paper Presentation
Computer Society of India (CSI)
[6]
PROVIDING ASSISTANCE TO DEVELOPING 4. Batista, E., IDC: Tech Bucks, Hack Threats Up, Wired
NATIONS News, 23 December 2002:
http://www.wired.com/news/infostructure/0,1377,56902,00.
Developing nations face particularly severe shortages of html.
resources and trained personnel that both decrease their own 5. Brush, C., Surcharge for Insecurity. Information Security
security posture and prevent them from effectively providing Magazine, July 2001:
assistance in such transnational efforts as investigation http://www.infosecuritymag.com/articles/july01/departments
procedures. Developing nations need an awareness of the _news.shtml.
problem, as well as laws to address it that are compatible CERT/CC, CERT/CC Statistics 1988-2002, 5 April 2002:
with the needs of the international community; but they also http://www.cert.org/stats/cert_stats.html.
need more. All countries need the capability to assist each 6. Coglianese, C., Globalization and the Design of
other in developing skills in the pursuit of secure networks. International Institutions, In J. S. J. Nye, and John D.
Donahue (Ed.), Governance in a Globalizing World,
Washington D.C., Brookings Institution Press, 2002.
CONCLUSION: Conry-Murray, A.Kerberos, Computer Security's Hellhound,
The security issues in our networked systems as described in Network Magazine, 5 July 2002,
this paper identify some of the work that needs to be done, http://www.commweb.com/article/NMG20010620S0008/1.
and the urgency with which concerns need to be addressed. 7. Council of Europe, Convention on Cyber crime ETS no.:
Dependence on some of the IT-based infrastructures in 185 - Explanatory Report (Article II, Section II) 23
several countries is such that serious national consequences November 2001:
could result from the exploitation of their vulnerabilities. http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.
And as the density of networks increases, the necessity for
transnational participation in improving network security
increases. The changing technologies and the potential for
changing threats is taxing our understanding of the threats
and how to deal with them. Due to the complexity and
entanglement among networks and communities
internationally, any increases in network security must
involve the concerted efforts of as many nations as possible.
We have to understand that a great deal can be accomplished
through such mechanisms, but not without taking note of
their earlier trouble spots. We must learn from prior
unexpected consequences in international cooperation, just
as in the battle to secure networked systems, and be ever
more cautious as we move forward toward some type of
international action. But move forward quickly we must if
the benefits from the use of our networked systems are to be
realized in the myriad ways that they have been and are
hoped for in the future. Nations must cooperate fully within
their capability in order to contain the actions of those who
threaten our networks, and to realize the positive vision that
we have for our societies.
REFERENCES:
1. “Google Query-Serving Architecture” at National
Conference sponsored by NACC (National Assessment and
Accreditation Council) By Suyog Dixit & Dr. R. K. Dixit
(HOD of Computer Science, Indore)
2. “Intrusion Controls in Computer Networks: How
Effective Are They and What a Computer Engineer Can
Do?”, Published in National Seminar, sponsored by Higher
Education of M.P.) By Suyog Dixit & Dr. R. K. Dixit
(HOD of Computer Science, Indore)
3. American Bar Association. International Cyber Crime
Project of the ABA Privacy and Computer Crime
Committee:
http://www.abanet.org/scitech/computercrime/cybercrimepr
oject.html.
Armageddon’08 April 01, 2008 Warfare: Paper Presentation
Computer Society of India (CSI)
[7]