Network Vulnerability Detection Using Ant Colony Optimization-A Review

Authors

  • Jindal S Student, Jind Institute of Engineering & Technology, Jind,India

Keywords:

Network Vulnerability, Computer Network

Abstract

A Computer Network is often refers to as a network, is used to share resources, applications and information through devices connected to the network. Computer network is a collection of autonomous computer interconnected by a single tech- nology. The computers aresaidto be interconnected if they are able to exchange information. The connection need not be a copper wire, fiber optics, microwaves, infrared and communication satellites can be used. Networks come in many sizes, shapes and forms. Network Security is becoming an important issue for all the organizations, and with the increase in knowledge of hackers and intruders they have made many successful attempts to bring down high-profile company University network sand web services.

References

Introduction to Network Security, Dr. Rahul Banerjee, BITS-Pilani, India www.discovery.bits pilani.ac.in/rahul/CompNet/index.htm

http://www.cert.org/tech tips/homeUniversitynetworks.html A Brief History of Network Security and the N d for Adherence to the Software Process Model, by Paul Innella, www.tdisecur .com/resources/assets/NetSec.pdf

Network Security fundamentals, By Gert De Laet, Gert Schauwers, Cisco press.

Network Attack nd Defence, By Roger Needham and Butler Lamson. www.cl.cam.ac.uk/ rja14/Papers/SE-18.pdf

Ecient countermeasures for software vulnerabilities due to memory manage-ment errors,Prof. Dr. ir. W. JOOSEN, Prof. Dr. ir. F. PIESSENS.

Computer Vulnerabilities, Written by Eric Knight, C.I.S.S.P. Original Publication: March 6, 2000.www.ussrback.com/docs/papers/general/compvulndraf t.pdf

http://www.antcolonies.net/howantscommunicate.html

http://en.wikipedia.org/wiki/Ant colony optimization

http://www.javvin.com/etrac/network-vulnerabilities.html

http://searchmidmarketsecurity.techtarget.com/sDefinition /0,,sid198 gci1176511,00.html

Downloads

Published

2017-03-30

How to Cite

Jindal, S. (2017). Network Vulnerability Detection Using Ant Colony Optimization-A Review. Universal Research Reports, 4(1), 93–97. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/31

Issue

Section

Original Research Article