{"title":"Network Intrusion Detection and Prevention","authors":"Akarshita Shankar, A. Shankar","doi":"10.37622/ijaar/16.4.2021.267-270","DOIUrl":null,"url":null,"abstract":": Network Intrusion is cybercrime, which involves hacking into users’ systems and stealing their sensitive and confidential information. The information could include credit card details, username, and passwords, bank details, etc. These attacks occur via ma licious viruses installed in the user’s system without his/her knowledge, blocking the network traffic to a legitimate site, etc. After obtaining the information, the attacker could commit crimes such as financial losses and identity theft. The target could be an individual, an organization, or a cluster in an organization. This paper provides an explanation of network intrusion, detection, and prevention to overcome them.","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"36 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Engineering Research (Netherlands)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37622/ijaar/16.4.2021.267-270","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 7
Abstract
: Network Intrusion is cybercrime, which involves hacking into users’ systems and stealing their sensitive and confidential information. The information could include credit card details, username, and passwords, bank details, etc. These attacks occur via ma licious viruses installed in the user’s system without his/her knowledge, blocking the network traffic to a legitimate site, etc. After obtaining the information, the attacker could commit crimes such as financial losses and identity theft. The target could be an individual, an organization, or a cluster in an organization. This paper provides an explanation of network intrusion, detection, and prevention to overcome them.