Study On Security Issues in Computer Networks and Encryption Techniques
Study On Security Issues in Computer Networks and Encryption Techniques
Study On Security Issues in Computer Networks and Encryption Techniques
Professor & Head, IT Department, PSV College of Engineering and Technology, Krishnagiri.
ABSTRACT
The problem of network attacks increases everyday as the number of network users and nodes gets increased. IT security
personnel and network engineers who are managing a very large networks finds solution to the common problems in Computer
Networks. The important issues that affect the Computer Networks are Performance Degradation, Host Identification and
Security Issues. In this paper we have discussed in detail about various security related issues in computer networks and
information security. Also, we have focused on how the current security schemes and encryption algorithms are not suitable for
the future needs and the necessity for developing new security mechanisms.
1. INTRODUCTION
A computer network or a data network is an information transfer network that permits computers to trade data [1]. In
computer networks the networked registering gadgets trades the data to one another along data associations. The
associations i.e., network lines between hubs are created utilizing two medias that is Cable media and Wireless media.
Web is the best known computer network [2]. IT security work force and network engineers who are dealing with huge
networks discover arrangement extremely odd to the regular issues in Computer Network. The fundamental issues that
influencing the Computer Networks are Performance Degradation, Host Identification and Security Issues
1.1 Performance Degradation
Execution debasement implies the issues identified with the loss of velocity and data trustworthiness because of poor
transmissions. Every last network is inclined to execution issues. Particularly substantial networks are vulnerable
because of the extra separation, endpoints, and extra gear at midpoints. Answers for execution corruption are
exceptionally troublesome. To build the execution of the networks we have to buy the best quality computer networking
fittings with a reasonable cost. Next is to assemble the establishment of great network equipment. At last network
execution ought to be on a par with the parts of which it is created. Quality is likewise an essential variable that ought
to be thought seriously about. Since quality in Networks without enough switches, switches, area controllers, and so on
is unrealistic to acquire the execution of the Network [4]. Great quality equipment ought to be there however that is not
just enough there ought to likewise be a legitimate design of the fittings. It is essential to guarantee that all computers
and network "pipes" are appropriately associated with a quality link and arranged legitimately it likewise incorporates
confirming network settings in server and desktop network arrangement applications and additionally checking settings
in the firmware of networking parts (switches, switches, firewalls, and so forth.). Each gadget joined on the network
ought to be at first and routinely checked for issues, as rebel PCs contaminated with infections, spyware, bootware can
squander bandwidth and even in most detrimental possibility can taint different frameworks.
1.2 Host Identification
Fitting arrangement is vital to keeping up legitimate host ID. Generally as the mail station can't convey a letter without
legitimate location the same with Computer Network [3]. With the little networks the arrangement can be effectively
finished with manual tending to yet this gets to be totally unrealistic in extensive networks. Thus, DHCP servers, area
controllers, and their imperative tending to programming and conventions are an absolute necessity in terms of making
and keeping up an extensive, versatile network. Top execution and legitimate host ID are barely gainful on a network
that has been broken by programmers. It is consequently the security of the network is just as vital.
1.3Security Issues
Network security issues include keeping up network respectability, keeping unapproved clients from penetrating the
framework (survey/taking delicate data, passwords, and so forth.), and ensuring the network dissent of administration
assaults [5]. These issues are extraordinarily amplified as networks increments in size. Bigger networks are more
Page 11
helpless to assault in light of the fact that they offer more defenseless focuses at which interlopers can get access. More
clients, more passwords, and more equipment mean more places a programmer can attempt to get in [6]. The answer
for these issues incorporate utilizing firewalls and intermediaries, introducing solid antivirus programming, conveying
strict watchword arrangements, making utilization of network examination programming, physically securing
computer networking resources, and conjuring methods that compartmentalize a huge network with inner limits [3].
2. CRYPTOGRAPHY
Cryptography is the practice and investigation of procedures that is utilized for secure correspondence as a part of the
vicinity of outsiders [11]. In more general, it is about developing and investigating conventions that defeat the impact
of outsiders and which are identified with different perspectives in data security, for example, data secrecy, data
respectability, validation, and non-renouncement. Applications of cryptography incorporate ATM cards, computer
passwords, and electronic business. Cryptography is only synonymous with encryption, the transformation of data from
an intelligible state to evident non- discernable one [12]. The originator of an encoded message ought to impart the
unraveling procedure required to recuperate the first data just with planned beneficiaries, consequently dismissing
undesirable persons to do likewise. Cryptography procedures are utilized to encode and decode the data. Present day
cryptography is intensely focused around numerical hypothesis and computer science hone; cryptographic calculations
are planned which are tricky to break by any enemy. It is hypothetically conceivable to break such a framework,
however it is infeasible to do so by any known viable means. These plans are accordingly termed computationally
secure. There are numerous data hypothetically secure plans that are turned out to be can't be equaled the initial
investment with boundless figuring power an illustration is the one-time cushion yet these plans are more hard to
actualize than the best hypothetically weak secure components.
Page 12
that their rate empowers them proficiently to encode extensive amounts of plaintext. There are two subcategories of
symmetric figure they are Stream Ciphers and Block Ciphers.
Table 1: Comparison of Few Cryptographic Techniques [14]
3. LITERATURE SURVEY
In [16], G. Di Blasi and G. Gallo and M. Petrilia, has been created composite pictures called Puzzle Image Mosaic
(PIM). This system is propelled by Jigsaw Image Mosaic (JIM), where picture tiles of discretionary shape are utilized to
create the last picture. The JIM methodology prompts great results, yet the obliged calculation time is high. A
Page 13
calculation is recommended that creates great brings about lower time. The procedure takes advantage from late comes
about data structures meant to streamline closeness inquiries. Exploratory results demonstrate the soundness of our
technique. Riddle Image Mosaic (PIM). PIM is focused around some late systems displayed in Computer Graphics: Fast
Photomosaic and Artificial Mosaic. Uniquely in contrast to JIM, PIM does not perform any deformity of the tiles so as
to make pictures all the more outwardly like Arcimboldo's artistic creations. Like Fast Photomosaic, PIM uses tiles
containing little pictures and embraces the Antipole procedure to accelerate the inquiry process. Further, PIM makes
utilization of the same calculation proposed in Artificial Mosaic for directional rule recognition. This proposed
calculation orchestrates mosaics with a worthy expense, even on unpredictable source pictures. "Photomosaic" change
a data picture into a rectangular network of thumbnail pictures. In this approach the calculation looks in a huge
database of pictures for one that approximates a square of pixels in the primary picture. The ensuing impact is
extremely great. As of late Di Blasi and Petralia introduced a methodology to accelerate the pursuit process. I contrast
our execution and JIM keeping in mind the end goal to survey the nature of our system. It ought to be commented that
the correlation is not totally reasonable on the grounds that the two calculations are planned to marginally diverse
purposes. In [17], another sort of mosaic has proposed by J. Kim and F. Pellacini to be specific Jigsaw Image Mosaic
(JIM), where picture tiles of self-assertive shape is utilized to make the last picture. The era of a Jigsaw Image Mosaic
is an answer for the accompanying issue: given a subjectively formed compartment picture and a set of discretionarily
molded picture tiles, fill the holder as minimally as would be prudent with tiles of comparable color to the holder taken
from the data set while alternatively distorting them marginally to attain an all the more outwardly satisfying impact.
In [18], Y. Dobashi, T. Haga, H. Johan, and T. Nisha proposed a non-photorealistic rendering strategy that makes a
creative impact called mosaicing. This system believers pictures gave by the client into the mosaic pictures. Business
picture altering applications likewise give a comparative capacity. Nonetheless, these applications frequently exchange
results for ease processing. It is attractive to make top notch pictures regardless of the possibility that the computational
expense is expanded. We introduce a programmed system for mosaicing pictures by utilizing Voronoi outlines. The
Voronoi outlines are improved so that the slip between the first picture and the ensuing picture is as little as could
reasonably be expected. Next, the mosaic picture is produced by utilizing the destinations and edges of the Voronoi
graph. Representation fittings can be utilized to effectively create Voronoi graphs. A "Voronoi picture" is a picture
being produced by utilizing Voronoi districts. A "reference picture" is the picture to be changed over into the mosaic
picture. The technique for making mosaic pictures with a higher quality than at present accessible strategies offer. In
[21], a novel methodology for manufactured mosaic era is proposed by . Battiato, G. Gallo, G. C. Guarnera, and G.
Puglisi. Inclination Vector Flow reckoning together with heuristics to expand the secured mosaic range is utilized. The
high recurrence points of interest are overseen in a worldwide manner permitting to protect the mosaic-style likewise
for little ones. Here, we receive an "one-after-one" tile situating and arranging methodology. The proposed
methodology utilizes Gradient Vector Flow (GVF). GVF has the capacity catch the general slope conduct in a fitting
manner. GVF is a field of vectors that minimizes the accompanying vitality capacity. The GVF power field can be
utilized to viably drive tiles situating. Edge data is protected; it is engendered in the nearby locales and blended
together in a smooth manner. A first focal point of the novel system is that it has the capacity better safeguard fine
points of interest. This happens in light of the fact that high recurrence ranges are prioritarily filled. This procedure
overcomes unequivocal edge recognition utilizing the Gradient Vector Flow. This strategy does not cut tiles. In [20], S.
Battiato, G. Di Blasi, G. M. Farinella, and G. Gallo proposed a strategy to be specific, "Computerized Mosaic
Framework". Craftsmanship frequently gives significant insights to innovative advancements particularly in the field of
Image Processing and Computer Graphics. Here, we review in a bound together schema a few techniques to change
raster info pictures into great quality mosaics. For each of the major diverse methodologies in writing the paper reports
a short portrayal and a dialog of the most significant issues. To finish the overview correlations among the distinctive
strategies both regarding visual quality and computational unpredictability are given .
Page 14
making utilization of any encryption. In addition, the security gave by encryption can be imaginory. On the off chance
that the framework where the encryption is performed can be infiltrated, then the gatecrasher may have the capacity to
get to plaintext straightforwardly from put away records or the substance of memory or alter network conventions,
application programming, or encryption programs to get access to keys or plaintext data or to modify the encryption
process. For instance, PGP (Pretty Good Privacy) could be supplanted with a Trojan horse that seems to carry on like
PGP however makes a mystery document of the client's keys for later transmission. A Trojan horse login project gathers
passwords. A late investigation of 8932 computers by the Defence Information Systems Agency demonstrated 88% of
the computers could be effectively assaulted. Utilizing PGP to encode data transmitted from or put away on the normal
framework could be similar to putting the strongest bolt on the indirect access of a building while leaving the front
entryway completely open. Data security obliges significantly more than simply encryption - verification, design
administration, great configuration, access controls, firewalls, reviewing, security practices, and security mindfulness
preparing are a couple of alternate procedures required Confinement of utilizing open key cryptography for encryption
is pace [15] and keysize as demonstrated in table 1. There are numerous mystery key encryption strategies that are
essentially speedier than any at present accessible open key encryption strategy. However open key cryptography can be
utilized with mystery key cryptography to bamboozle both. For encryption, the best arrangement is to consolidate open
and mystery key frameworks with a specific end goal to get both the security focal points of open key frameworks and
the velocity preferences of mystery key frameworks. Open key cryptography may be helpless against mimic, regardless
of the fact that clients' private keys are not accessible. In a few circumstances, open key cryptography is redundant and
mystery key cryptography alone is sufficient. These incorporate situations where secure mystery key conveyance can
happen, for instance, by clients meeting in private. It additionally incorporates situations where a solitary power knows
and deals with all the keys, for instance, a shut saving money framework. Since the power knows everybody's keys as of
now, there is very little focal point for some to be "open" and others to be "private." Note, be that as it may, that such a
framework may get to be unrealistic if the quantity of clients gets to be extensive; there are not so much any such limits
in an open key framework.
5.CONCLUSION
In this paper we did a detailed study on Security Issues in Computer Networks and Encryption Techniques. We have
compared few basic encryption algorithms with each other. From the above discussion it is clear that the existing
solutions related to security is not enough and for the future need new ideas has to be implemented along with the
existing techniques. The concepts like steganography can be combined with the cryptography will become a powerful
tool for security. In the near future, the most important use of stenographic techniques will probably be lying in the
field of digital watermarking.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
http://www.tutorialspoint.com/data_communication_computer_network/
http://www.icaiknowledgegateway.org/littledms/folder1/chapter-3-computer-networks-network-security.pd
http://www.gettingyouconnected.com/the-top-3-issues-affecting-todays-large-computer-networks/
http://docwiki.cisco.com/wiki/Quality_of_Service_Networking
http://www.gettingyouconnected.com/network-security-and-preserving-network-integrity/
http://www.gettingyouconnected.com/data-security-issues-on-computer-networks/
http://en.wikipedia.org/wiki/Information_security
M. S. Lew, N. Sebe, C. Djeraba, and R. Jain, Content- based multimedia information retrieval:p state of the art
and challenges, ACM Trans. Multimedia Comput, Feb. 2006.
[9] Harikrishna Narasimhan, Sanjeev Satheesh, A Randomized Itersative Improvement Algorithm for Photomosaic
Generation, Vol 2,April 2010.
[10] http://www.utica.edu/faculty_staff/qma/needforsecurity.pdf
[11] http://en.wikipedia.org/wiki/Cryptography
[12] http://my.ss.sysu.edu.cn/WebSec/download/chap2.pdf
[13] https://community.ja.net/library/advisory-services/introduction-cryptographic-techniques
[14] http://www.javamex.com/tutorials/cryptography/ciphers.shtml
[15] http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/advantages-and-disadvantages.htm
[16] G. Di Blasi and G. Gallo and M. Petrilia, Puzzle image mosaic, in proc. IASTED/VIIP, Benidrom, Spain, Sep.
2005.
[17] J. Kim and F. Pellacini, Jigsaw image mosaics, in Proc SIGGRAPH, San Antonio, Jul 2002.
[18] Y. Dobashi, T. Haga, H. Johan, and T. Nisha, A method for creating mosaic image using voronoi diagrams, in
proc. Eurographiocs, Saarbrucken, Germany, Sep. 2002.
Page 15
[19] S. Battiato, G. Gallo, G. C. Guarnera, and G. Puglisi, Artificial mosaic by gradient vector flow, in proc.
Eurographics, April 2008.
[20] S. Battiato, G. Di Blasi, G. M. Farinella, and G. Gallo, Digital Mosaic framework: AN overview, Eurograph.
Comput. Graph. Forum, vol.26, no. 4, pp, Dec 2007.
[21] S.Battiato, Gianpiero Di blasi, Glovanni Gallo, A Novel Artificial Mosaic Generation Technique Driven by Local
Gradient Analysis.
Page 16