Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset

Abstract: The network infrastructure of any organization is always under constant threat to a variety of attacks; namely, break-ins, security breach or system misuse. The Network Intrusion Detection System (NIDS) employed in a network detects such penetration attacks and intrusions within a network. Known classes of attacks can be detected easily by performing pattern matching … Read more

Network Security Protocols

NETWORK SECURITY DA-1 Registration Number:16BCI0095 What are Network security protocols? Protocols are a set of rules governs the communications between two sources. Network security protocols are a type network protocol that ensures the security and integrity of data in transit over a network connection. Network security protocols define how to secure network data from any … Read more

Local Area Network (LAN)

A local area network (LAN) is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings. Most LANs connect workstations and personal computers and enable users to access data and devices (e.g., printers and modems) anywhere on the network. The hardware components of … Read more

Introduction to the Transport Layer of the OSI Model

Transport Layer Introduction to the Transport layer: The transport layer is the 4thlayer of the OSI model. Transport layer offers peer-to-peer and end-to-end connection between two processes on remote hosts. Transport layer offers reliable connection-oriented and connectionless depending on the application. Transport layer takes data from Application layer and then breaks it into smaller size … Read more

Commonly used network devices

A network is a collection of computers, servers, mainframes, network devices and peripherals connected to one another to allow the sharing of data. Below are some of the commonly used network devices. Bridge A network bridge joins two different computer networks using the same protocol to enable them to work as a single network. Bridges … Read more

Stolen Credentials on the Dark Web: A Reminder to Replace KBA with MFA

Recent news accounts of security researchers discovered a database containing 1.4 billion breached credentials — reportedly, the largest such find on the Dark Web — is yet more evidence that online identity proofing that relies only on KBA (knowledge-based authentication) and static passwords is no longer fit-for-purpose. The level of sophistication that cybercriminals bring to … Read more

Open Systems Interconnect

The seven-layer OSI stands for Open Systems Interconnect reference model is a reparation of the way data travels through a network, it is an international standard for communication, the ISO reference model is divided into seven different layers, these are the application, the presentation, the session, the transport, the network, the data link, and the … Read more