Data Encryption Standard (DES) was the set up plan of the standard symmetric-key encryption designs. By and by it has
been well ordered supplanted by the triple DES or AES so that the encoder has a greater key space.
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DEFENSE
1. A NETWORK CODING AND DES BASED
DYNAMIC ENCRYPTION SCHEME FOR
MOVING TARGET DEFENSE
BY
Y.MOHAN SAI KRISHNA (15831A1260)
P.GANGA BHAVANI (15831A1248)
P.AKHIL KUMAR (15831A1244)
P.BHUVANA (15831A1245)
UNDER THE GUIDANCE OF
B.SWETHA
ASSISTANT PROFESSOR
3. ABSTRACT
Not in the least like prior undertakings in cyber security investigate, a dynamic
insurance speculation, called moving target protect (MTD), grows the
multifaceted nature and costs for attacks by sufficiently binding the vulnerability
presentation and the ambush openings through various industriously developing
appraisal, progression parts and procedure. Data Encryption Standard (DES) was
the set up plan of the standard symmetric-key encryption designs. By and by it has
been well ordered supplanted by the triple DES or AES so that the encoder has a
greater key space. Nevertheless, both the triple DES and AES can't meet the
dynamic security necessities of dynamic obstruction as a result of their static
extension to the key space. In this paper, we propose a dynamic 3-layer
encryption scheme in light of DES and framework coding, with a low-
multifaceted design mostly key invigorate instrument. In perspective of the
theoretical examination, the new arrangement is seemed to have the favorable
position to achieve a dynamic change among viability and security, which grows
its adaptability to various computerized conditions. The multiplication comes to
fruition moreover show that the running extent of the new arrangement is by and
large lower than or proportionate to the triple DES.
5. USER INTERFACE DESIGN
In this module we design the windows for the project .These
windows are used for secure login for all users. To connect with
server user must give their username and password then only they
can able to connect the server. If the user already exits directly can
login into the server else user must register their details such as
username, password and Email id, into the server. Server will create
the account for the entire user to maintain upload and download
rate. Name will be set as user id. Logging in is usually used to enter
a specific page.
7. 7
ADMIN
This is the first module of this project. In this module admin can login.
Admin will see the details of data owners and users. Admin has information
about files, and he need to protect the keys from attacker by updating the
file keys regularly. Admin need to approve the file request from user and
send to data owner to give permission to access the files. Admin will see the
attacker details, users who will access the files without data owner
permission.
9. DATA OWNER
This is the second module of this project. In this module data owner
should login. Data owner will upload the files. Those files are split into
multiple parts and then triple encrypted and stored into the database. If
any user want to access that files then data owner need to provide the
keys for that file. If admin accept the users request to access the file then
data owner will provide the keys for that file.
11. MOVING TARGET DEFENSE
This is the third module of the project. In this module file uploaded by the
data owner will split into multiple parts, then first the content will
encoded in the network, then it will undergo DES encryption, then again
that encrypted data is encoded, and then store in the database. And admin
need to modify the keys to protect the data from the attackers. He will
alter the key size also.
13. USER
This is the fifth module of this project. In this module user need to register
and then login. Then user can search the files based on the file name. If the
file exist it will display, else it show the message that file not exist. The file
available, then user will download the file, which is triple encrypted format.
So, then user required the keys to decrypt the file. So, user will send the
request to provide the keys. Then admin will accept his request. Some
updated keys will display to the user, at the time user try to download
original file multiple times then user treated as attacker. Data owner will
provide the keys for file then user can download the original file.
15. EXISTING SYSTEM
Nowadays, network security configurations are typically deterministic,
static and homogeneous.
File Data may easily hacked or theft by the untrusted Server.
Thus, the attackers take the asymmetric advantages of building up,
launching and spreading attacks, and the defenders are at a passive position.
The existing defense mechanisms and approaches cannot reverse this
situation.
16. DRAWBACKS
• Can Upload Single Data at a time.
• Produce Single key for Security of each parameters.
17. PROPOSED SYSTEM
• The outsourced computation data is more secured.
• The publicly and efficiently verify the inner product evaluation over the
outsourced data streams under multiple keys still make more security and
accessing data is efficient.
• Here admin will upload all the details about that content.
• If any user wants they have to send a request. if admin accept they will
provide 4 keys with file if the user enter that key exactly then only that
original content will be decrypt.
• Them only the file will be full and securely we can transfer to user.
20. SYSTEM REQUIREMENTS
HARDWARE
PROCESSOR : DUAL CORE DUOS
RAM : 4GB DD RAM
HARD DISK : 250 GB
SOFTWARE
FRONT END : JAVA (J2EE,SERVLETS)
BACK END : MY SQL
OPERATING SYSTEM : WINDOWS 07
IDE : NET BEANS, ECLIPSE
21. LITERATURE SURVEY
• Title: Moving Target Defense Creating Asymmetric Uncertainty For
Cyber Threats
• Author: S. Jajodia
• Year: 2011
• Description: Excellent book is always being the best friend for spending
little time in your office, night time, bus, and everywhere. It will be a good
way to just look, open, and read the book while in that time. As known,
experience and skill don't always come with the much money to acquire
them. Reading this book with the PDF moving target defense creating
asymmetric uncertainty for cyber threats will let you know more things.
• As known, adventure and experience about lesson, entertainment, and
knowledge can be gained by only reading a book. Even it is not directly
done, you can know more about this life, about the world. We offer you
this proper and easy way to gain those all. We offer many book collections
from fictions to science at all. One of them is this moving target defense
creating asymmetric uncertainty for cyber threats that can be your partner.
22. • Title: Moving Target Defense II: Application of Game Theory and
Adversarial Modeling
• Author: S. Jajodia
• Year: 2013
• Description: Our cyber defenses are static and are governed by lengthy
processes, e.g., for testing and security patch deployment. Adversaries could
plan their attacks carefully over time and launch attacks at cyber speeds at any
given moment. We need a new class of defensive strategies that would force
adversaries to continually engage in reconnaissance and re-planning of their
cyber operations. One such strategy is to present adversaries with a moving
target where the attack surface of a system keeps changing. Moving Target
Defense II: Application of Game Theory and Adversarial Modeling includes
contributions from world experts in the cyber security field. In the first volume
of MTD, we presented MTD approaches based on software transformations,
and MTD approaches based on network and software stack configurations. In
this second volume of MTD, a group of leading researchers describe game
theoretic, cyber maneuver, and software transformation approaches for
constructing and analyzing MTD systems. Designed as a professional book for
practitioners and researchers working in the cyber security field, advanced -
level students and researchers focused on computer science will also find this
book valuable as a secondary text book or reference.
23. • Title: Linear Network Coding: Theory and Algorithms
• Author: Shuo-Yen Robert Li
• Year: 2011
• Description: Network coding is a new paradigm in data transport that combines
coding with data propagation over a network. Theory of linear network coding
(LNC) adopts a linear coding scheme at every node of the network and promises
the optimal data transmission rate from the source to all receivers. Linearity
enhances the theoretic elegance and engineering simplicity, which leads to wide
applicability. This paper reviews the basic theory of LNC and construction
algorithms for optimal linear network codes. Exemplifying applications are
presented, including random LNC. The fundamental theorem of LNC applies to
only acyclic networks, but practical applications actually ignore the acyclic
restriction. The theoretic justification for this involves convolutional network
coding (CNC), which, however, incurs the difficulty of precise synchronization.
The problem can be alleviated when CNC is generalized by selecting an
appropriate structure in commutative algebra for data units. This paper tries to
present the necessary algebraic concepts as much as possible in engineering
language.