@msec.org.in
ASSISTANT PROFESSOR-COMPUTER SCIENCE
mohamed sathak engineering college
Computer Engineering, Computer Networks and Communications, Artificial Intelligence, Information Systems
Scopus Publications
Scholar Citations
Scholar h-index
S. Faizal Mukthar Hussain, R. Karthikeyan, S. Ramamoorthi, I. Sheik Arafat, and S. Syed Musthafa Gani
IEEE
The world of today has been transformed into a little community where everyone may communicate with one another. The widespread use of the internet makes this possible. People now have a huge window of opportunity thanks to the internet to broaden their perspectives. Threats to personal security were another negative, which will result in expenses for both psychological support and money. There is a lot of research being done to preserve the data in such an environment. The results of this survey could improve internetworking environment security and control current assaults like DoS and cyberattacks. As it allows for the interception of private networks, intrusion is a problem that frequently arises in internetwork. Denials of Service Attacks are a significant issue in Internet networks as it can disrupt communication between two or more authorized entities. The entire focus of this research is on examining the approaches used to develop intrusion detection systems.
S.Faizal Mukthar Hussain, R. Karthikeyan, S. Ramamoorthi, I.Sheik Arafat, and S.Syed Musthafa Gani
IEEE
Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.