Abstract

Due to rapid need of computer's in business and other organizations many networks has been established. In today scenario attacks on computer networks has increased to a great extend. Networks are very much needed but they are very prone to attacks because of security breaches & vulnerabilities in traditional establishments. There are many types of attacks which can be penetrated in our networks or edge devices; one of the most prone attack is the ICMP flood attack leading to denial of service. In this paper we would analyze different types of DOS attacks and available mechanism to protect our network. Further we describe the need of establishment of secure computer networks by using proper policies, rules on edge network devices. We also have tested them in Lab using GNS3 simulator. By implementing enhanced policies internal network's can be secured from attacks like ICMP flood.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call