In this paper, we have proved the diminution in error approximation when identity authentication is done with Ideal Password Authentication Scheme (IPAS) for Network Security. Effectiveness of identity authentication parameters for various attacks and security requirements is verified in the paper. Result of analysis proves that IPAS would enhance the transport layer security. Proof of efficiency of result is generated with drastic diminution in error approximation. IPAS would have advanced security parameters with implemented RNA-FINNT which would result in fortification of the transport layer security protocol for enhancement of Network Security.
 K. Kaur and G. Geetha, “Survey for Generating an Ideal Password Authentication Scheme Which Results in Fortification of Transport Layer Security Protocol,” International Journal of Computer Science and Information Technologies, Vol. 3, No. 2, 2012, pp. 3608-3614. http://www.ijcsit.com/ ijcsit-v3issue2.php
 K. Kaur and G. Geetha, “Fortification of Transport Layer Security Protocol by Using Password and Fingerprint as Identity Authentication Parameters,” International Journal of Computer Applications, Vol. 42, No. 6, 2012, pp. 36-42.
 K. Kaur and G. Geetha, “Fortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter,” International Journal of Computer Science Issues, Vol. 9, No. 2, 2012, pp. 188-193.
 K. Kaur and G. Geetha, “Generating Multi Server Environment for implementation of Ideal Password Authentication Scheme,” International Journal of Advances in Computer Networks and Its Security, Vol. 2, No. 3, 2012, pp. 2250-3757.
 C. A. Huegen, “Network-Based Denial of Service Attacks”. www.pentics.net/ denial-of-service/ presentations/.../1998-0209_dos.pp...
 K. Davis,” DNS Cache Poisoning Vulnerability Explanation and Remedies,” Viareggio, 2008. www.iana.org/about/.../davies-viareggio-entropyvuln-081002.pdf
 D. G. Park, C. Boyd and S.-J. Moon, “Forward Secrecy and Its Application to Future Mobile Communications Security”. www.dgpark6.com/ Down/pkc2000_FwdSec.pdf
 R. Bidou, “Ping of Death”. www.iv2-technologies.com/ DOSAttacks.pdf
 V. Goyal, V. Kumar, M. Singh, A. Abraham and S. Sanyal, “CompChall: Addressing Password Guessing Attacks,” 2003. http://eprint.iacr.org /2004/136.pdf
 L. Seltzer, “Spoofing Server-Server Communication: How You Can Prevent It,” 2009. www. verisign.com/ssl/ssl.../ssl.../ whitepaper-ev-prevent-spoofing.pdf
 H. Jeong, D. H. Won and S. Kim, “Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol,” Journal of Information Science and Engineering, Vol. 26, No. 5, 2010, pp. 1845-1858.
 “Smurf Attack”. http://en.wikipedia.org/wiki/Smurf_attack
 “Teardrop Attack Detection”. https://www.daxnetworks.com/Dax/Products/Switch/DTS_T5C_24G_ 24GT. htm
 K. Kaur and G. Geetha, “Implementing RNA-FINNT in Ideal Password Authentication Scheme Results in Fortification of Transport Layer Security Protocol,” International Journal of Advances in Computer Science and Its Application, Vol. 2, No. 3, 2012, pp. 201-205.