Users online: 4860    [ij] [ij] [ij] 
Email id

Research Journal of Engineering and Technology
Year : 2017, Volume : 8, Issue : 1
First page : ( 04) Last page : ( 08)
Print ISSN : 0976-2973. Online ISSN : 2321-581X.
Article DOI : 10.5958/2321-581X.2017.00002.2

A study of Network Attacks and Features of Secure Protocols

Dr. Rao J. Durga Prasad1,*, Mr. Rai Sankalp2, Dr. Narain Bhavana3

1Additional Director and HOD, Computer Science, Shri Shankaracharya Mahavidyalaya, Junwani, Bhilai

2Scholar, MATS University, Raipur. sankalprai@gmail.com

3MATS University, Raipur. narainbhawna@gmail.com

*Corresponding Author Email: j.durga.prasad.rao@gmail.com

Online published on 17 July, 2017.


Remote protocols are essential part of the computer network systems. Since data or information is sent from one system to another, there arise many issues regarding security and the validation of this information. This paper aims to explain the basic outlook of the security measures. Every protocol which are implemented commonly are vulnerable and there are various threats that act against privacy, data integrity, availability of service, etc. It is important to have knowledge and security experiences about secure protocols. This Study contains features of the designed secure protocols. Every new protocol should meet or at least should address described issues like secure protocol does. This can be used to safeguard the existing computer networks.



Network Attacks, Secure Protocols, Security measures, Cryptography, Denial-of-Service.


║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
556,102,871 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.