Full Paper View Go Back

Protection of Research Data and Devices from Malware Attacks Using Endpoint Security System in Network

Pratap Singh Solanki1 , Ajay Singh2 , Shaneel Sao3 , N.D. Atkekar4

Section:Research Paper, Product Type: Journal
Vol.12 , Issue.3 , pp.15-18, Jun-2024

Online published on Jun 30, 2024


Copyright © Pratap Singh Solanki, Ajay Singh, Shaneel Sao, N.D. Atkekar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pratap Singh Solanki, Ajay Singh, Shaneel Sao, N.D. Atkekar, “Protection of Research Data and Devices from Malware Attacks Using Endpoint Security System in Network,” International Journal of Scientific Research in Network Security and Communication, Vol.12, Issue.3, pp.15-18, 2024.

MLA Style Citation: Pratap Singh Solanki, Ajay Singh, Shaneel Sao, N.D. Atkekar "Protection of Research Data and Devices from Malware Attacks Using Endpoint Security System in Network." International Journal of Scientific Research in Network Security and Communication 12.3 (2024): 15-18.

APA Style Citation: Pratap Singh Solanki, Ajay Singh, Shaneel Sao, N.D. Atkekar, (2024). Protection of Research Data and Devices from Malware Attacks Using Endpoint Security System in Network. International Journal of Scientific Research in Network Security and Communication, 12(3), 15-18.

BibTex Style Citation:
@article{Solanki_2024,
author = {Pratap Singh Solanki, Ajay Singh, Shaneel Sao, N.D. Atkekar},
title = {Protection of Research Data and Devices from Malware Attacks Using Endpoint Security System in Network},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2024},
volume = {12},
Issue = {3},
month = {6},
year = {2024},
issn = {2347-2693},
pages = {15-18},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=448},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=448
TI - Protection of Research Data and Devices from Malware Attacks Using Endpoint Security System in Network
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Pratap Singh Solanki, Ajay Singh, Shaneel Sao, N.D. Atkekar
PY - 2024
DA - 2024/06/30
PB - IJCSE, Indore, INDIA
SP - 15-18
IS - 3
VL - 12
SN - 2347-2693
ER -

4 Views    4 Downloads    2 Downloads
  
  

Abstract :
In ealier era, computer were used by limited organizations with limited Internet accessibility therefore data and device security were not big issue. Gradulay, uses of computer increased exponentialy therefore day-by-day it posing new data security challenges. As the uses of Intrenet increases, the challenges of critical data security also increased. Every 39 second, one cyber attack is occurring and thousands website hacked daily. Every establishment uses the computational devices with Internet for running and expnading their business. The computational devices are generting huge volume of data which is very sensitive and essenatial to run the organization. All the devices which are connected in open network are prone to attack by harmful viruses. In this hyper-connected world, protecting the devices and data from loss and unauthorized access are big challenge. The Process of protecting the data from destructive threats, unauthorised access and data corruption is known as data security. In past, the Antivirus software on individual desktop computer were sufficient to protect the device but for various network devices, which are connected in Local Area Network (LAN) is required integrated centralized solution along with management tools. Many antivirus tools sometime failed to detect the advance thretas due to that risk of vulnerability and data lost may increased. End point securiy is an process to protect the all devices which is connected in network. As the Internet uses grown, the types of the threats and techniques changed due to that these Antivirus tools could not prove full efficient to protect the sesitive data. The antivirus software can be used for individual machine but in organization Network, dedicated Endpoint Security System (EPS) is necessary for quickly detecting the malware and common security threats in advance. The EPS runs on organization security policy. The full-proof defence with advanced threat detection system is very necessary. EPS, is an Software System to protect the organization network devices from dectructive threats. It is an device level security system with centralized management and results were encoraging . The End Point Security System provide the security beyond the traditional antiviurs software along with additional features to block the modern threats. In this paper we are discussing about the implementation of Endpoint Security system for protecting computational devices and protecting the scientific and bussiness data at CWPRS Local Area Network (CLAN). The Endpoint Security System has been successfully implemented for protecting the scientific data and devices from external possible thretas.

Key-Words / Index Term :
End Point Security System, Virus, Antivirus, Device Protection, Cyber threats, Malware.

References :
[1] Molina-Coronado, B., Mori, U., Mendiburu, A., & Miguel-Alonso, J. “Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process”, arXiv preprint arXiv:2001.0969, 2020.
[2] F. Cohen, "Computer viruses: theory and experiments," Computers and Security, Feb., Vol.6, pp.22-35, 1987.
[3] J. Shoch, J. Hupp, "The worm programs - early experience with a distributed computation," Commun. Of ACM, March, Vol.25, pp.172-180, 1982.
[4] E. Spafford, "The Internet worm program: an analysis," ACM Comp. Commun. Rev., Jan., Vol.19 , pp.17-57, 1989.
[5] S. Cass, "Anatomy of malice," IEEE Spectrum, Nov., pp.56- 60, 2001.
[6] Cert-In, Information Security Policy for protection of critical information and infrastructure CERT-in/NISAP/01, May, Issue.1, 2006.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation