Simulation of Packet level dataset for Network Intrusion Detection
I. Introduction:
The Internet is a global public network and it is the Universal source of information. It has become a popular medium for commercial activities. Millions of dollars of transactions occur daily in many financial organizations through Internet. The internet along with digital technologies has taken human life into much higher levels of sophistication and ease. The growth of Internet has brought about great benefits to the modern society; meanwhile, the rapidly increasing connectivity and accessibility to the Internet has posed a security threat. With the tremendous growth of network-based services and sensitive information on networks, network security is getting more and more import than ever. The attacks on the Internet have become both more prolific and easier to implement because of the ubiquity of the Internet and the pervasiveness of easy-to-use operating systems and development environments.
Data is often the most valuable asset possessed by an organization and it is the main target of intentional attacks. Data stored, processed, and transmitted by a computer system must be protected. Business organizations use the internet as an important aspect of their business model. In addition to using internet applications, such as the web and email, to generate revenue and communicate with customers, they also store important and proprietary information on computers that are accessible
Due to the internet and E-commerce, data security is even more important due to the possibility of hackers, viruses, and malware.
Numerous association and organizations in this world, including government and military store a lot of secret data on PCs and send essential information around the world to different PCs. With programmers out there, there ought to be an extraordinary level of security to ensure these information and individual data. As indicated by senate insight authorities, Cyber attack is one of the main dangers in the country so this needs to compass consideration.
As technology grows and information has become a critical asset companies currently are devoted their resource and money to protect their data as important as their finance and human resource assets.
The exponential increase use of the Internet to communicate, conduct business transactions, access personal banking, healthcare, education at confront of being anywhere has become an everyday lifestyle for many people around the globe. This reliance on computers, laptops, devices and other Internet of Things to access the Internet means, organizations, businesses and the government have also seen an increase occurrence of sophisticated attacks.
Businesses are becoming ever more dependent on digital information and electronic transactions, and as a result face stringent data privacy compliance challenges and data security regulations. With the enterprise increasingly under threat of cyber attacks and malicious insiders, business applications and networks are now dependent on the use of digital credentials to control how users and entities access sensitive data and critical system resources.
Data security is not just imperative to consumers whose information is stored; it is also significant to the organizations who store this information. A failure to secure information can impede a business in a number of ways. Losing information that gives an organization a competitive advantage can lead the destruction of; and cause consumers to abandon the organization and seek out another organization to do business with.
Securing data that is sensitive for businesses is more important today because of how vulnerable data is, compared to what it has ever been. National security information, corporate trade secrets, social security numbers, personal medical records, and credit card information are all used, transmitted, and stored on the internet and other multimedia devices.
We are living in the world where we are required to yield our personal data information to authority or companies such as names, date of birth, social security number or even credit numbers (Magalhaes, 2012). We may be aware that the personal data can expose to unauthorized people if our data is not secure properly, either via wire or wireless network. Lost or stolen data has been seen while data is transferred between different users using both networks. Can we trust companies to keep our data safe from being lost or misuse? Yes, we can. With new cyber-crime laws are enforced, it is in the company's best interest to keep their customers' data more secure (Magalhaes, 2012). This article will summarize the major security risks and threats to
The monitoring of Internet activity along with regular scanning of company computers, including the files and documents it contains, helps protect not only the computer equipment but any secure information that can potentially be harmed or even extracted by attacks or computer hackers. When users visit a Web site, they may be asked to provide specific registration information, which can be used to create an individual user profile when combined with other data collected through tracking technology. Consequently, this information can be used to send unsolicited bulk e-mail,
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.
Governments, businesses and individuals are using the internet for day-to-day activities and any disruption can have devastating effects. This dependence on electronic information exchange, whilst having its positive side, also has a big negative with security issues. The ease at which a website or news portal can be attacked and taken down by almost any person with an internet connection is of huge concern. The various methods of electronic attacks which can take shape bring forward the subject of electronic warfare and how it impacts society. Various attacks can take place, although the distributed denial-of-service attack is the one of focus due to its eafse and its common appearance on the internet.
The internet is a medium that is becoming progressively important as it makes information available in a quick and easy manner. It has transformed communications and acts as a global network that allows people to communicate and interact without being limited by time, boarders and distance. However, the infrastructure is vulnerable to hackers who use the system to commit cyber crime. To accomplish this, they make use of innovative stealth techniques for their malicious purposes in the internet.
The forefront and need of Information and Cyber Security has progressively spread as communication media as well as the exponential growth rate of electronic storage and information transmissions increase at astounding proportions. The need for Security today has never been higher equally for private and organizational use. There are many significant reasons behind the growth of Security in both Information and Cyber fronts. Per (Yildirim, E. Y., Akalp, G., Aytac, S., & Bayram, N., 2011) these are classified as the increase in electronic applications in businesses and daily life, sharing information on network systems, accessibility of information from many points, the increasing threat of loss of information, and most
As time goes by, network security has become substantially more important, whether it be for a business, the military, or even a private computer. With the introduction of the internet, security became a major concern and it’s only though a brief look recap on the history of security that we are allowed a better understanding of the emergence of the new technology that is released for the private and public sector. As mentioned earlier, the creation of the Internet allowed for a plethora of new threats. Despite the constant threats of malware and other annoyances, the architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats.