Preface ...................................................... xiii
Chapter 1
Introduction to Network Security ................................ 1
С.V. Anchugam, Government Arts College (Autonomous),
India
K. Thangadurai, Government Arts College (Autonomous),
India
Chapter 2
Security Issues in Mobile Wireless Networks .................... 49
Arif Sari, Girne American University, Cyprus
Chapter 3
Virtual Private Networks ....................................... 78
Alok Vishwakarma, Sysbiz Technologies Pvt. Ltd., India
Chapter 4
Classification of Network Attacks and Countermeasures of
Different Attacks .............................................. 115
С.V. Anchugam, Government Arts College (Autonomous),
India
K. Thangadurai, Government Arts College (Autonomous), India
Chapter 5
Attacks in Wireless Sensor Networks ............................ 157
George William Kihirige, Department of Informatics,
Sokoine University of Agriculture, Tanzania
Camilius A. Sanga, Department of Informatics, Sokoine
University of Agriculture, Tanzania
Chapter 6
Sensors Network: In Regard with the Security Aspect and
Counter Measures ............................................... 176
Mamta Bachani, Mehran University of Engineering and
Technology, Pakistan
Ahsan Memon, Mehran University of Engineering and
Technology, Pakistan
Faisal Karim Shaikh, Mehran University of Engineering and
Technology, Pakistan & Umm Al-Qura University, Saudi Arabia
Chapter 7
DDoS Attacks and Their Types ................................... 197
Dileep Kumar, Adama Science and Technology University,
Ethiopia
Chapter 8
Cluster-Based Countermeasures for DDoS Attacks ................. 206
Mohammad Jabed Morshed Chowdhury, Daffodil International
University, Bangladesh
Dileep Kumar G, Adama Science and Technology University,
Ethiopia
Chapter 9
Intrusion Detection System (IDS) and Their Types ............... 228
Manoranjan Pradhan, GITA, India
Chinmaya Kumar Nayak, GITA, India
Sateesh Kumar Pradhan, Utkal University, India
Chapter 10
Intrusion Prevention System .................................... 245
Bijaya Kumar Panda, GITA, India
Manoranjan Pradhan, GITA, India
Sateesh Kumar Pradhan, Utkal University, India
Chapter 11
AdaBoost Algorithm with Single Weak Classifier in Network
Intrusion Detection ............................................ 259
P. Natesan, Kongu Engineering College, India
P. Balasubramanie, Kongu Engineering College, India
G. Gowrison, Institute of Road and Transport Technology,
India
Chapter 12
Countering RSA Vulnerabilities and Its Replacement by ECC:
Elliptic Curve Cryptographic Scheme for Key Generation ......... 270
Behnam Rahnama, ScaleDB Inc., USA
Arif Sari, Girne American University, Cyprus
Marwan Yassin Ghafour, Sulaimani Polytechnic University,
Iraq
Chapter 13
Changing Dynamics of Network Security involving Hacking/
Cracking with Next Generation Firewalls (NGFW) ................. 313
Alok Vishwakarma, Sysbiz Technologies, India
Wafa Waheeda S, Qatar University, Qatar
Compilation of References ...................................... 329
About the Contributors ......................................... 350
Index .......................................................... 355
|