|A new improved data mining approach for network security|
|Er. Vibha, Er. Ankur gupta|
|Cite This Article:|
A new improved data mining approach for network security, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 11 ,Page(s):455-465 ,January 2019 ,Available :IJIRT147523_PAPER.pdf
|data mining, network security, cyber attack|
|Over the last decade, we have become too much technology dependent. Now-a-days we rely on networks to receive emails, banking, stock price, news and online shopping. The need for protecting files in computer systems became more evident with the advent of shared systems. The need became even more severe for systems being accessed over a public network, the Internet. Information in transit must be protected from unauthorized release and changes. The connection itself must be securely established and maintained. The term network security defines that, Network is interconnection (or link) for example network of computers and Security is the freedom from danger or anxiety so Network Security is about securing and protecting the network (externally and internally) from Distributed Denial of Service attacks, rapidly spreading viruses, self-replicating worms, destructive malware and other attacks. Network security begins with authorization and authentication. Organizations are spending billions of dollars just to make their network secure and protect their data from outside and inside attack. However securing and protecting today’s complex network in not so easy, it is challenging and demanding . There are many traditional security solutions existing but these solutions do not perform well. Here we proposed a security solution for network data security.|
|Unique Paper ID: 147523|
Publication Volume & Issue: Volume 5, Issue 11
Page(s): 455 - 465
|Article Preview & Download|
Experimental Study on Lightweight Fly Ash Aggregat...
Paper ID : IJIRT148696
CFD ANALYSIS ON WASTE HEAT RECOVERY UTILIZING THER...
Paper ID : IJIRT148692
AN INTRODUCTION TO SPHERICAL FUZZY TOPOLOGICAL SPA...
Paper ID : IJIRT148683
Auto secure: A Device with Emotion Detection Enabl...
Paper ID : IJIRT148682
A REVIEW: STRUCTURAL OPTIMIZATION OF RAILWAY SLEEP...
Paper ID : IJIRT148681