Study on Networking Attacks and Security Algorithms

Shalini Singh*, Aniket Ram Kewat**
*-** Technical Vocational Education and Skill Development Indira Gandhi National Tribal University, Amarkantak, Madhya Pradesh, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jdf.1.1.19110

Abstract

The dependence of humans on computers is increasing in today's era of technology. All transactions, as well as digital data transformations, are done with the help of the network, so third parties or intruders can attack the network to access data and use it in the wrong way. Organizations and individuals use the network for their work. Due to the easy availability of the internet, there is always a risk of information falling into the wrong hands. This paper presents a detailed study of networking attacks and security algorithms, as well as an analysis of various viable network attack observation tools to detect attacks. The algorithms discussed include Symmetric Key Algorithm, Asymmetric Key Algorithm, and their respective types.

Keywords

Attacks, Networking, Cryptography, Encryption Algorithms.

How to Cite this Article?

Singh, S., and Kewat, A. R. (2023). Study on Networking Attacks and Security Algorithms. i-manager’s Journal on Digital Forensics & Cyber Security, 1(1), 30-38. https://doi.org/10.26634/jdf.1.1.19110

References

[1]. Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1-11.
[5]. Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications, 9(12), 11-15.
[10]. Maqsood, F., Ahmed, M., Ali, M. M., & Shah, M. A. (2017). Cryptography: a comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, 8(6), 442-448.
[11]. Melnikov, D., & Jones, A. (2004, June). Masquerade'attacks and a process for their detection. In Proceedings of the 3rd European Conference on Information Warfare and Security. Royal Holloway University of London, UK (pp. 269).
[12]. Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z. A., Shakir, N. S. A., & Deris, M. M. (2017). A survey on the cryptographic encryption algorithms. International Journal of Advanced Computer Science and Applications, 8(11), 333-344.
[14]. Patil, S., & Bhusari, V. (2014). An enhancement in international data encryption algorithm for increasing security. International Journal of Application or Innovation in Engineering & Management, 3(8), 64-70.
[15]. Samant, P. K., Viswakarma, S. K., & Yadav, P. (2015). Security loopholes and passive attacks for m-commerce in pki-based infrastructure. International Journal of Advanced Technology in Engineering and Science, 3(1), 54-62.
[17]. Steiner, M., Tsudik, G., & Waidner, M. (1996, January). Diffie-Hellman key distribution extended to group communication. In Proceedings of the 3rd ACM Conference on Computer and Communications Security (pp. 31-37).
[18]. Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International Journal of Emerging Technology and Advanced Engineering, 1(2), 6-12.
[19]. Verma, H. K., & Singh, R. K. (2012). Performance analysis of RC6, Twofish and Rijndael block cipher algorithms. International Journal of Computer Applications, 42(16), 1-7.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.