Open Access   Article Go Back

Mitigating Cyber Attacks Through Security Models and Networking Protocols

Pranav Chaudhary1

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 925-929, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.925929

Online published on Aug 31, 2018

Copyright © Pranav Chaudhary . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pranav Chaudhary, “Mitigating Cyber Attacks Through Security Models and Networking Protocols,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.925-929, 2018.

MLA Style Citation: Pranav Chaudhary "Mitigating Cyber Attacks Through Security Models and Networking Protocols." International Journal of Computer Sciences and Engineering 6.8 (2018): 925-929.

APA Style Citation: Pranav Chaudhary, (2018). Mitigating Cyber Attacks Through Security Models and Networking Protocols. International Journal of Computer Sciences and Engineering, 6(8), 925-929.

BibTex Style Citation:
@article{Chaudhary_2018,
author = {Pranav Chaudhary},
title = {Mitigating Cyber Attacks Through Security Models and Networking Protocols},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {925-929},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2797},
doi = {https://doi.org/10.26438/ijcse/v6i8.925929}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.925929}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2797
TI - Mitigating Cyber Attacks Through Security Models and Networking Protocols
T2 - International Journal of Computer Sciences and Engineering
AU - Pranav Chaudhary
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 925-929
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
521 336 downloads 268 downloads
  
  
           

Abstract

With the increasing dependency of most of the organizations on technology in today’s world, the aspect of information security is a major concern. A plethora of data, be it insignificant (like text messages) or vital (data of some government agency) is stored and transferred over the internet and is exposed to a variety of attacks by people with immoral intentions. Information security is therefore a vital aspect for any organization or government body which has to ensure that their data is not mutated by an attacker and reaches the intended recipient unchanged. This paper discusses various types of security models which are used in practice by the organizations and various cryptographic methods that are commonly used for the protection of data against undesirable breaches. A variety of algorithms have been developed in order to protect the data. Various types of keys which form an essential component of the encrypting algorithms are also discussed. There are several cyber-attacks which pose an austere threat to the organizations. These threats can be mitigated using various cryptographic algorithms and network protocols. These protocols also play an important role in mitigating the security breaches of sensitive data and are discussed towards the end of this paper.

Key-Words / Index Term

Cyber Security, Cyber-attacks, Cypher Text, Cryptography, Phishing, Security Protocol

References

[1] Singh Anurag, Singh Brijmohan, "Cyber Security Policies for Digital India: Challenges & Opportunities", International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.164-168, 2017.
[2] Steve G. Walkins, “An Introduction to Information Security and ISO27001:2013: A Pocket Guide”, IT Governance Publishing, pp. 21-42, 2013.
[3] Suganya V,"A Review on Phishing Attacks and Various Anti Phishing Techniques." International Journal of Computer Applications 139.1 (2016): 20-23.
[4] Amalraj, A. Joseph, and J. John Raybin Jose. "A survey paper on cryptography techniques." International Journal of Computer Science and Mobile Computing 5.8 (2016): 55-59.
[5] Cherdantseva, Yulia, and Jeremy Hilton. "A reference model of information assurance & security." 2013 International Conference on Availability, Reliability and Security. IEEE, 2013.
[6] Vipin Poddar, Hitesh Choudhary. "A Comparitive Analysis of Wireless Security Protocols (WEP and WPA2)”, International Journal of AdHoc Networking Systems, Vol. 4, No. 3, July 2014.
[7] Mahjabin, Tasnuva, Yang Xiao, Guang Sun, and Wangdong Jiang. "A survey of distributed denial-of-service attack, prevention, and mitigation techniques." International Journal of Distributed Sensor Networks 13, no. 12, 2017.
[8] Mishra, Neha, and Sunita Gond. "Defenses to protect against SQL injection attacks." International Journal of Advanced Research in Computer and Communication Engineering 2.10 (2013).
[9] Ayushi. “A Symmetric Key Cryptographic Algorithm”, International Journal of Computer Applications, Volume 1 – No. 15, 2010.
[10] Sanjay E. Pate, Bhojaraj H. Barhate, "A survey of Possible Attacks on Text & Graphical Password Authentication Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.77-80, 2018
[11] B. Bhasker, T. Jagadish kumar, M.V.Kamal, "A Security Determination-Reaction Architecture for Heterogeneous Distributed Network", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.26-34, 2017
[12] Poonam Devi , "Attacks on Cloud Data: A Big Security Issue", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018
[13] Shailja Sharma, "A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.66-69, 2018