Emperical Study of Various Security Mechanisms on Network

Authors(1) :-Bhart Bhushan

This paper expounds the Network Security issues which are becoming important as increasing demand of good quality communication. We are moving to digital information age so Information security is one of the critical component in ensuring secure communication and transaction i.e. m-commerce over the internet. There are various methods available and in use to provide security some of them are based on intrusion detection system (IDS) or authentication based methods i.e. passwords, biometric authentication. One of the most popular ways of ensuring security in the network is authentication. This paper analyse the various authentication techniques such as Token-based and Biometric-based and Knowledge-based and also gives a description of the architecture of Snort rule set which is a very popular digital signature and Intrusion Detection system on anomaly based. Furthermore, we also discuss the advantages of FPGA devices which are used in intrusion detection system implementation.

Authors and Affiliations

Bhart Bhushan
Village Gehli, PO Hamidpur, Tehsile Narnaul, Haryana, India

Snort, Authentication, Denial of service, IDS, Passcode, Smart card, FPGA, RSA, Biometric

  1. Jae-Jung Kim and Seng-Phil Hong, "A Method of Risk Assessment for Multi-Factor Authentication", Journal of Information Processing Systems, Vol.7, No.1, March 2011.
  2. Anupriya Shrivastava et al, International Journal of  Computer Science and Mobil Computing, Vol.3 Issue.6, June- 2014.
  3. Hafiz Zahid Ullah Khan, "Comparative Study of Authentication Techniques", IJVIPNS-IJENS Vol: 10 No: 04.
  4. Przemyslaw Kazienko & Piotr Dorosz. Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture). www.windowsecurity.com › Articles & Tutorials
  5. Online]Available: http://www.authenticationworld.com/Token-Authentication.
  6. The Snort Project, Snort User Manual 2.9.5,May 29, 2013, Copyright 1998-2003Martin Roesch, Copyright 2001-2003 Chris Green, Copyright 2003-2013 Sourcefire, Inc.
  7. Online]Available:http://www.authenticationworld.com/Authentication-Biometrics.
  8. Qinghua Li, Student Member, IEEE, and Guohong Cao, Fellow, IEEE "Multicast Authentication in the Smart Grid with One Time Signature", IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011.
  9. Online]Available: http://www.duosecurity.com.
  10. J.  Moscola,  J.  Lockwood,  R.P.  Loui,  and  M.  Pachos, "Implementation of a Content-Scanning Module for an Internet Firewall," Proc. of 11th IEEE Symp. on Field-Programmable Custom Computing Machines, FCCM 2003, pp. 31-38.
  11. Online]Available:http://ids.nic.in/technical_letter/TNL_JCES_JUL_2013/Advance%20Authentication%2 0Technique.pdf.
  12. Stamati Gkarafli, Anastasios A. Economides, "Comparing the Proof by Knowledge Authentication Techniques", international Journal of Computer Science and Security (IJCSS), Volume (4): Issue (2).
  13. Roger Meyer, "Secure authentication on the internet"As the part of security reading room, SANS institute 2007.
  14. R. Dhamija, and A. Perrig,"Deja Vu: "A User Study Using Images for Authentication", 9th USENIX Security Symposium, 2000.
  15. R. Morris, K. Thompson, "Password security: A case history," Comm. ACM, Vol.22, no. 11, Nov. 1979, pp. 594-597.
  16. B. L. Riddle, M. S. Miron, J. A. Semo, "Passwords in use in a university timesharing environment," Computers and Security, Vol. 8, no. 7, 1989, pp. 569-579.
  17. S. M. Bellovin, M. Merritt, "Encrypted key exchange: Password-based protocols secure against dictionary attacks," Proc. 1992 IEEE Computer Society Conference on Research in Security and Privacy, 1992, pp. 72-84.
  18. Haq, I. U. and Yahya, K. M. "Heterogeneous Networks: Challenges and Future Requirements".
  19. Srilatha Chebrolu, Ajith Abrahama,,*, Johnson P. Thomas, Feature deduction and ensemble design of intrusion detection systems, Elsevier Ltd. doi:10.1016/j.cose.2004.09.008
  20. TSENG, Y.M., YANG, C.C. AND HAUR SU, J. "Authentication and Billing Protocols for the Integration of WLAN and 3G Networks", 2004.
  21. Li, S., Zhou, J., Li, X. and Chen, K. "An Authentication Protocol for Pervasive Computing".
  22. Misbahuddin, M., Premchand, P. and Govardhan, A. "A User Friendly Password Authenticated Key Agreement for Multi Server Environment", November 2009.
  23. Sumanth Donthi Roger L. Haggard . A Survey of Dynamically Reconfigurable FPGA Devices. 0-7803-7697-8/03/2003 IEEE.
  24. S. Sinha, F. Jahanian, J. Patel, "Wind: Workload-aware intrusion detection",Recent Advances in Intrusion Detection, Springer, pp. 290-310,2006.

Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary 2015
Date of Publication : 2015-02-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 385-391
Manuscript Number : IJSRSET173625
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Bhart Bhushan, " Emperical Study of Various Security Mechanisms on Network, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.385-391, January-Febuary-2015.
Journal URL : http://ijsrset.com/IJSRSET173625

Article Preview

Follow Us

Contact Us