SlideShare a Scribd company logo
1 of 14
Restricted Routing Infrastructures

By
A.Sai Charan
K.Shiva Chandra
M.Bhanu Chandar Reddy
INTRODUCTION
• In this project we design an infrastructure for

preventing the un trusted parties getting access to the
routing information.
• Also we are achieving flexible and efficient
communication. However there are some difficulties in
doing so they are the new security vulnerability that is
introduced.
• The flexible control plane of these infrastructures can
be exploited to launch many types of powerful attacks
with little effort.
• In this project, we make several contributions towards
studying security issues in forwarding infrastructures
(FIs).
Functional Requirements
• The Valid user enter into login to send data to available

network system
• The user enter valid username and password to enter into
Login Page
• Client is a system which send a request to transfer a file to
the server which is connected
• Server is a system which provides acknowledgement to the
client, Once the server received the file.
Non-Functional Requirements
Better component design to get better performance at peak

time
The system is more reliable.
Flexible service based architecture will be highly desirable
for future extension
Existing System
• In the existing system work group list won’t populate or is in

complete. Says network resources are unavailable or sites
permission problem.
• The system doesn’t understood sharing files among all range
of system IP address.
• There is no interface designed to search the files on a specific
LAN. High level views of the system network activity are not
provided by the existing system.
Proposed Systems
• In the system we are going to develop a infrastructure that can prevent

the end user in having control over the routing.
• And also the infrastructure that is developed is the forwarding
infrastructure.
FI Model
• Identifiers and Forwarding Entries 
• Packet Routing Functions
• Packet Matching:
• Packet Header Update:
Threat Model
• Security Assumptions.
• Attacker Threat Model 
Modules
Login Module
Assigning Rule
Securing File
Sending the file
Receiving File
Environment
• Operating System: - Microsoft Windows XP/2000 or
•
•
•
•
•
•

Higher
Data Base: Microsoft SQL Server 2005/2008
Development Tools: Microsoft Visual Studio .Net
2008/2010
Documentation Tools: MS Office 2007/2010
Drawing Tools: IBM Rational Rose Enterprise, MS Office
Visio 2007
User Interface: Windows Forms
Code Behind: VC#.NET
Requirements
Hardware Requirements:
 PIV 2.8 GHz Processor and Above
 RAM 1GB and Above
 HDD 40 GB Hard Disk Space and Above

Software Requirements:
 WINDOWS OS (XP / 2000 / 2000 Server / 2003 Server)
 Visual Studio .Net 2008/2010 Enterprise/Professional Edition
 MS.Net Framework 3.5
 SQL Server 2005/2008 Enterprise Edition
Choosing File
Assigning Rule
Acknowledgement
CONCLUSION
It is concluded that the application works well and satisfy

the users.
 The application is tested very well and errors are
properly debugged.
 The site is simultaneously accessed from more than one
system. Simultaneous login from more than one place is
tested.
THANK YOU

More Related Content

What's hot

Addmi 03-addm prerequisites
Addmi 03-addm prerequisitesAddmi 03-addm prerequisites
Addmi 03-addm prerequisites
odanyboy
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
Tech_MX
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
webhostingguy
 
Reverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clientsReverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clients
Steve Markey
 
Microsoft Enterprise Communications Event
Microsoft Enterprise Communications EventMicrosoft Enterprise Communications Event
Microsoft Enterprise Communications Event
heathermcgough
 
Citrix Interview Questions
Citrix Interview QuestionsCitrix Interview Questions
Citrix Interview Questions
Sudharshan Raman
 

What's hot (20)

Addmi 03-addm prerequisites
Addmi 03-addm prerequisitesAddmi 03-addm prerequisites
Addmi 03-addm prerequisites
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Authorization at Penn
Authorization at PennAuthorization at Penn
Authorization at Penn
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
People soft overview
People soft overviewPeople soft overview
People soft overview
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
 
Hp open view(hp ov)
Hp open view(hp ov)Hp open view(hp ov)
Hp open view(hp ov)
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
(ATS3-PLAT04) Database Connectivity for Application Development
(ATS3-PLAT04) Database Connectivity for Application Development(ATS3-PLAT04) Database Connectivity for Application Development
(ATS3-PLAT04) Database Connectivity for Application Development
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
client server protocol
client server protocolclient server protocol
client server protocol
 
6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
 
Client server component
Client server componentClient server component
Client server component
 
Reverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clientsReverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clients
 
Microsoft Enterprise Communications Event
Microsoft Enterprise Communications EventMicrosoft Enterprise Communications Event
Microsoft Enterprise Communications Event
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4
 
TristinDavis-DotNet
TristinDavis-DotNetTristinDavis-DotNet
TristinDavis-DotNet
 
Citrix Interview Questions
Citrix Interview QuestionsCitrix Interview Questions
Citrix Interview Questions
 
005.itsecurity bcp v1
005.itsecurity bcp v1005.itsecurity bcp v1
005.itsecurity bcp v1
 

Similar to Restricted routing infrastructures PPT

Online examination system project ppt
Online examination system project pptOnline examination system project ppt
Online examination system project ppt
Mohit Gupta
 

Similar to Restricted routing infrastructures PPT (20)

W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
CH05-CompSec4e.pptx
CH05-CompSec4e.pptxCH05-CompSec4e.pptx
CH05-CompSec4e.pptx
 
EAI example
EAI exampleEAI example
EAI example
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
Ruslan Belkin And Sean Dawson on LinkedIn's Network Updates Uncovered
Ruslan Belkin And Sean Dawson on LinkedIn's Network Updates UncoveredRuslan Belkin And Sean Dawson on LinkedIn's Network Updates Uncovered
Ruslan Belkin And Sean Dawson on LinkedIn's Network Updates Uncovered
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
142 wendy shank
142 wendy shank142 wendy shank
142 wendy shank
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
Online examination system project ppt
Online examination system project pptOnline examination system project ppt
Online examination system project ppt
 
Online examination system project ppt
Online examination system project pptOnline examination system project ppt
Online examination system project ppt
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security Configuration
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Restricted routing infrastructures PPT

  • 1. Restricted Routing Infrastructures By A.Sai Charan K.Shiva Chandra M.Bhanu Chandar Reddy
  • 2. INTRODUCTION • In this project we design an infrastructure for preventing the un trusted parties getting access to the routing information. • Also we are achieving flexible and efficient communication. However there are some difficulties in doing so they are the new security vulnerability that is introduced. • The flexible control plane of these infrastructures can be exploited to launch many types of powerful attacks with little effort. • In this project, we make several contributions towards studying security issues in forwarding infrastructures (FIs).
  • 3. Functional Requirements • The Valid user enter into login to send data to available network system • The user enter valid username and password to enter into Login Page • Client is a system which send a request to transfer a file to the server which is connected • Server is a system which provides acknowledgement to the client, Once the server received the file.
  • 4. Non-Functional Requirements Better component design to get better performance at peak time The system is more reliable. Flexible service based architecture will be highly desirable for future extension
  • 5. Existing System • In the existing system work group list won’t populate or is in complete. Says network resources are unavailable or sites permission problem. • The system doesn’t understood sharing files among all range of system IP address. • There is no interface designed to search the files on a specific LAN. High level views of the system network activity are not provided by the existing system.
  • 6. Proposed Systems • In the system we are going to develop a infrastructure that can prevent the end user in having control over the routing. • And also the infrastructure that is developed is the forwarding infrastructure. FI Model • Identifiers and Forwarding Entries  • Packet Routing Functions • Packet Matching: • Packet Header Update: Threat Model • Security Assumptions. • Attacker Threat Model 
  • 7. Modules Login Module Assigning Rule Securing File Sending the file Receiving File
  • 8. Environment • Operating System: - Microsoft Windows XP/2000 or • • • • • • Higher Data Base: Microsoft SQL Server 2005/2008 Development Tools: Microsoft Visual Studio .Net 2008/2010 Documentation Tools: MS Office 2007/2010 Drawing Tools: IBM Rational Rose Enterprise, MS Office Visio 2007 User Interface: Windows Forms Code Behind: VC#.NET
  • 9. Requirements Hardware Requirements:  PIV 2.8 GHz Processor and Above  RAM 1GB and Above  HDD 40 GB Hard Disk Space and Above Software Requirements:  WINDOWS OS (XP / 2000 / 2000 Server / 2003 Server)  Visual Studio .Net 2008/2010 Enterprise/Professional Edition  MS.Net Framework 3.5  SQL Server 2005/2008 Enterprise Edition
  • 13. CONCLUSION It is concluded that the application works well and satisfy the users.  The application is tested very well and errors are properly debugged.  The site is simultaneously accessed from more than one system. Simultaneous login from more than one place is tested.