Network Security
Network Security
Network Security
Submitted by
Seminar Report submitted in partial fulfillment of the requirements for the award
of Degree of B.Tech. in Computer Science & Engineering under DRIEMS
University
2021 - 2025
Certificate
This is to certify that this is a bonafide Seminar report, titled “Network Security”, done
satisfactorily by Aswini Kumar Dibyajoti(2101229047) in partial fulfillment of
requirements for the degree of B.Tech. in Computer Science & Engineering under Biju
Patnaik University of Technology (BPUT).
This Seminar report on the above mentioned topic has not been submitted for any other
examination earlier before in this institution and does not form part of any other course
undergone by the candidate.
I am also thankful to my friends who have helped me directly or indirectly for the success
of this seminar.
Network security consists of the policies adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources.
Network security involves the authorization of access to data in a network, which is
controlled by the network administrator. Network Security is a broad topic that covers a
multitude of sins (an act that causes strong disapproval). Network security has become more
important to personal computer users, organizations and the military. With the phenomenal
growth in the Internet, network security has become an integral part of computer and
information security. In order to come up with measures that make networks more secure, it
is important to learn about the vulnerabilities that could exist in a computer network and then
have an understanding of the typical attacks that have been carried out in such networks. The
main motive behind this paper is to study the threats to network security and the measures or
techniques we should follow to protect our network
Keywords: Resources, Authorization, Security, Communications, Server, Network
CONTENTS
LIST OF FIGURES i
CHAPTER 1 1
1 INTRODUCTION 1
CHAPTER 2 4
2 SYSTEM OVERVIEW 4
CHAPTER 3 7
3.2 SENSORS 7
4 THE SOFTWARE 8
CONCLUSION 18
REFERENCES 19
LIST OF FIGURES
i
CHAPTER 1
INTRODUCTION
Network security is a mechanism to protect data or message from going into the hands of
malicious people. Network security covers a variety of computer networks, both public and
private, that are used in everyday jobs; conducting transactions and communications among
businesses, government agencies and individuals. Networks can be private, such as within a
company, and others which might be open to public access. Network security is involved in
organizations, enterprises, and other types of institutions. It does as its title explains: It
secures the network, as well as protecting and overseeing operations being done. The most
common and simple way of protecting a network resource is by assigning it a unique name
and a corresponding password. Network security is typically handled by a network
administrator or system administrator who implements the security policy, network software
and hardware needed to protect a network and the resources accessed through the network
from unauthorized access and also ensure that employees have adequate access to the
network and resources to work. A network security system typically relies on layers of
protection and consists of multiple components including networking monitoring and security
software in addition to hardware and appliances. All components work together to increase
the overall security of the computer network. Network security is an organization’s strategy
and provisions for ensuring the security of its assets and of all network traffic. Network
security is manifested in an implementation of security policy hardware, and software.
Network security is crucial requirement in emerging networks. Network Security is the
process of taking physical and software preventative measures to protect the underlying
networking infrastructure from unauthorized access, misuse, malfunction, modification,
destruction, or improper disclosure, thereby creating a secure platform for computers, users
and programs to perform their permitted critical functions within a secure environment.
1|Page
1.1 NETWORK SECURITY CONCEPTS
Network security starts with authenticating, commonly with a username and a password.
Since this requires just one detail authenticating the user name—i.e., the password—this is
sometimes termed one-factor authentication. With two-factor authentication, something the
user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone);
and with three-factor authentication, something the user 'is' also used (e.g., a fingerprint or
retinal scan). Once authenticated, a firewall enforces access policies such as what services are
allowed to be accessed by the network users. Though effective to prevent unauthorized
access, this component may fail to check potentially harmful content such as computer
worms or Trojans being transmitted over the network. Anti-virus software or an intrusion
prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly
based intrusion detection system may also monitor the network like wire shark traffic and
may be logged for audit purposes and for later high-level analysis. Communication between
two hosts using a network may be encrypted to maintain privacy.
Several new assumptions have to be made about computer networks because of their
evolution over the years:
Modern networks are very large, very interconnected, and run both ubiquitous
protocols (such as IP) and proprietary protocols. Therefore, they are often open to
access, and a potential attacker can with relative ease attach to, or remotely access,
such networks. Widespread IP internetworking increases the probability that more
attacks will be carried out over large, heavily interconnected networks, such as the
Internet.
Computer systems and applications that are attached to these networks are becoming
increasingly complex. In terms of security, it becomes more difficult to analyze,
secure, and properly test the security of the computer systems and applications; it is
even more so when virtualization is involved. When these systems and their
applications are attached to large networks, the risk to computing dramatically
increases.
2|Page
1.2 NETWORK SECURITY
System and network technology is a key technology for a wide variety of applications. Networks
and applications need security. Although, network security is a critical requirement, there is a
significant lack of security methods that can be implemented easily. There exists a
“communication gap” between the developers of security technology and developers of networks.
Network design is a well‐developed process that is based on the Open Systems Interface (OSI)
model. The protocols of different layers can be easily combined to create stacks which allow
modular development. The implementation of individual layers can be changed later without
making other adjustments, allowing flexibility in development. In contrast to network design,
secure network design is not a well‐developed process. There isn’t a methodology to manage the
complexity of security requirements. Secure network design does not contain the same advantages
as network design. Network security doesn’t mean securing both end computers. When
transmitting data the communication channel should not be vulnerable to attack. A possible hacker
could target the communication channel, obtain the encrypted data, and decrypt it and re ‐insert a
false message. Securing the middle network is just as important as securing the computers and
encrypting the message.
3|Page
used. Network intrusions consist of packets that are introduced to cause problems for the
following reasons:
To consume resources uselessly
To interfere with any system resource’s intended function
To gain system knowledge like passwords, logins that can be exploited in later
attacks.
4|Page
CHAPTER 2
DIFFERENTIATING DATA SECURITY AND NETWORK SECURITY
Data security is the aspect of security that allows a client’s data to be transformed into
unintelligible data for transmission. Even if this unintelligible data is intercepted, a key is
needed to decode the message. This method of security is effective to a certain degree. Strong
cryptography in the past can be easily broken today. Due to advancement of hackers,
cryptographic methods have to develop constantly to be one step ahead. When transferring
cipher text over a network, it is helpful to have a secure network. This will allow for the
cipher text to be protected, so that it is less likely for many people to even attempt to break
the code. A secure network will also prevent someone from inserting unauthorized messages
into the network. Therefore, hard ciphers are needed as well as attack‐hard networks.
The relationship of network security and data security to the OSI model is shown in Figure 1.
It can be seen that the cryptography occurs at the application layer; therefore the application
writers are aware of its existence. The user can possibly choose different methods of data
security. Network security is mostly contained within the physical layer. Layers above the
physical layer are also used to accomplish the network security required. Authentication is
5|Page
performed on a layer above the physical layer. Network security in the physical layer requires
failure detection, attack detection mechanisms, and intelligent counter measure strategies.
CHAPTER 3
ARCHITECTURE OF THE INTERNET
Backbone ISP (Internet Service Provider) − Backbone ISPs are large international backbone
networks. They are equipped with thousands of routers and store enormous amounts of
information in data centers, connected through high bandwidth fiber optic links. Everyone
needs to connect with a backbone ISP to access the entire Internet.
6|Page
There are different ways through which a client can connect to the ISP. A commonly used
way is DSL (Digital Subscriber Line) which reuses the telephone connection of the user for
transmission of digital data. The user uses a dial-up connection instead of the telephone call.
Connectivity is also done by sending signals over cable TV system that reuses unused cable
TV channels for data transmission. For high-speed Internet access, the connectivity can be
done through FTTH (Fiber to the Home), that uses optical fibers for transmitting data.
Nowadays, most Internet access is done through the wireless connection to mobile phones
from fixed subscribers, who transmit data within their coverage area.
8|Page
tunnel. SSL provides authentication of clients to server through the use of
certificates. Clients present a certificate to the server to prove their identity
2.4 Anti‐Malware Software and Scanners
Viruses, worms and Trojan horses are all examples of malicious software, or
Malware for short. Special so‐called anti‐Malware tools are used to detect them
and cure an infected system.
9|Page
CHAPTER 4
CURRENT DEVELOPMENTS IN NETWORK SECURITY
The network security field is continuing down the same route. The same methodologies are
being used with the addition of biometric identification. Biometrics provides a better method
of authentication than passwords. This might greatly reduce the unauthorized access of secure
systems. The software aspect of network security is very dynamic. Constantly new firewalls
and encryption schemes are being implemented. The research being performed assist in
understanding current development and projecting the future developments of the field.
1. Hardware Developments
Hardware developments are not developing rapidly. Biometric systems and smart
cards are the only new hardware technologies that are widely impacting security. The
most obvious use of biometrics for network security is for secure workstation logons
for a work station connected to a network. Each workstation requires some software
support for biometric identification of the user as well as, depending on the biometric
being used, some hardware device. The cost of hardware devices is one thing that may
lead to the widespread use of voice biometric security identification, especially among
companies and organizations on a low budget. Hardware device such as computer
mice with built in thumbprint readers would be the next step up. These devices would
be more expensive to implement on several computers, as each machine would
require its own hardware device.
10 | P a g e
2. Software Developments
The software aspect of network security is very vast. It includes firewalls, antivirus,
VPN, intrusion detection, and much more. The research development of all security
software is not feasible to study at this point. The goal is to obtain a view of where the
security software is heading based on emphasis being placed now.
4.1 SECURITY IN DIFFERENT NETWORKS
The businesses today use combinations of firewalls, encryption, and authentication
mechanisms to create “intranets” that are connected to the internet but protected from it at the
same time. Intranet is a private computer network that uses internet protocols. Intranets differ
from "Extranets" in that the former are generally restricted to employees of the organization
while extranets can generally be accessed by customers, suppliers, or other approved parties.
There does not necessarily have to be any access from the organization’s internal network to
the Internet itself. When such access is provided it is usually through a gateway with a
firewall, along with user authentication, encryption of messages, and often makes use of
virtual private networks (VPNs). Although intranets can be set up quickly to share data in a
controlled environment, that data is still at risk unless there is tight security. The disadvantage
of a closed intranet is that vital data might not get into the hands of those who need it.
Intranets have a place within agencies. But for broader data sharing, it might be better to keep
the networks open, with these safeguards:
1. Firewalls that detect and report intrusion attempts
2. Sophisticated virus checking at the firewall
3. Enforced rules for employee opening of e‐ Mail attachments
4. Encryption for all connections and data transfers
5. Authentication by synchronized, timed passwords or security certificates
It was mentioned that if the intranet wanted access to the internet, virtual private networks are
often used. Intranets that exist across multiple locations generally run over separate leased
lines or a newer approach of VPN can be utilized. VPN is a private network that uses a public
network (usually the Internet) to connect remote sites or users together. Instead of using a
dedicated, real‐world connection such as leased line, a VPN uses "virtual" connections routed
through the Internet from the company's private network to the remote site or employee.
4.2 FUTURE TRENDS IN SECURITY
What is going to drive the Internet security is the set of applications more than anything else.
The future will possibly be that the security is similar to an immune system. The immune
11 | P a g e
system fights off attacks and builds itself to fight tougher enemies. Similarly, the network
security will be able to function as an immune system. The trend towards biometrics could
have taken place a while ago, but it seems that it isn’t being actively pursued. Many security
developments that are taking place are within the same set of security technology that is
being used today with some minor adjustments.
4.3 CHALLENGES AND CONSIDERATION
Network security faces various challenges and considerations due to the dynamic nature of
cyber threats, evolving technologies, and organizational requirements. Here are some key
challenges and considerations:
1. Sophisticated Cyber Threats
2. Insider Threats
12 | P a g e
challenges for network security. Managing and securing diverse network components,
protocols, and communication channels requires robust security policies, network
segmentation, and continuous monitoring.
4. Vulnerabilities in Third-Party Software and Services:
Third-party software and services often introduce vulnerabilities that can be exploited
by attackers to compromise network security. Vulnerabilities in operating systems,
applications, and firmware require timely patch management and vulnerability
assessments to reduce the risk of exploitation. Additionally, organizations should
carefully evaluate the security posture of third-party vendors and service providers
before integrating their solutions into the network.
5. Data Privacy and Compliance Requirements:
Data privacy regulations, such as GDPR, CCPA, and HIPAA, impose strict
requirements on the protection of personal and sensitive data. Ensuring compliance
with regulatory standards while maintaining the confidentiality, integrity, and
availability of data poses significant challenges for network security. Organizations
must implement data encryption, access controls, and audit trails to meet regulatory
requirements and mitigate legal and financial risks.
6. Scalability and Performance:
As networks grow in size and complexity, ensuring scalable and high-performance
security solutions becomes increasingly challenging. Security controls such as
firewalls, intrusion detection systems (IDS), and encryption mechanisms must be able
to handle increasing volumes of network traffic without impacting performance.
Implementing distributed security architectures and leveraging cloud-based security
services can help address scalability concerns.
7. Emerging Technologies and Threat Vectors:
The adoption of emerging technologies such as artificial intelligence (AI), machine
learning (ML), IoT, and 5G introduces new attack surfaces and threat vectors.
Security challenges associated with these technologies include securing AI and ML
models against adversarial attacks, protecting IoT devices from botnets and malware,
and ensuring the security and resilience of 5G networks against advanced threats.
8. Skills Shortage and Resource Constraints:
The shortage of skilled cybersecurity professionals and limited resources pose
significant obstacles to effective network security. Organizations struggle to recruit
13 | P a g e
and retain qualified security personnel capable of designing, implementing, and
managing complex security solutions. Investing in employee training, automation
technologies, and managed security services can help alleviate skills shortages and
resource constraints.
CONCLUSION
Network security is an important field that is increasingly gaining attention as the internet
expands. The security threats and internet protocol were analyzed to determine the necessary
changes in security technology. The security technology is mostly software based, but many
common hardware devices are used. The current development in network security is not very
impressive. Originally it was assumed that with the importance of the network security field,
new approaches to security, both hardware and software, would be actively researched. It was
a surprise to see most of the development taking place in the same technologies being
currently used. Combined use of IPv6 and security tools such as firewalls, intrusion detection,
and authentication mechanisms will prove effective in guarding intellectual property for the
near future. The network security field may have to evolve more rapidly to deal with the
threats further in the future.
14 | P a g e
15 | P a g e
REFERENCES
1. Dowd, P.W.; McHenry, J.T., "Network security: it's time to take it seriously,"
Computer, vol.31, no.9, pp.24‐28, Sep 1998
2. Kartalopoulos, S. V., "Differentiating Data Security and Network Security,"
Communications, 2008. ICC '08. IEEE International Conference on, pp.1469‐1473, 19 ‐
23 May 2008
3. Molva, R., Institut Eurecom,“Internet Security Architecture,” in Computer Networks &
ISDN Systems Journal, vol. 31, pp. 787‐804, April 1999
4. Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling
& Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no.,
pp.77‐82, 13‐15 May 2008
5. Marin, G.A., "Network security basics," Security & Privacy, IEEE , vol.3, no.6, pp. 68‐
72, Nov.‐Dec. 2005
6. Andress J., “IPv6: the next internet protocol,” April 2005,
www.usenix.com/publications/login/2005‐04/pdfs/andress0504
16 | P a g e