SlideShare a Scribd company logo
PacketcaptureTopology
Technologies:
•GraphicalNetworkSimulator-3(GNS3):SowaretoemulaterealCiscoIOSforadvanced
networktopologiesthatcombinebothvirtualandrealenvironment.
•Wireshark:Open-sourcepacketanalyzerusedfornetworkanalysisandtroubleshooting.
Md.AbuSaleh
201111977
MohamedSaadawi201020543
MuhammadMuaaz201011302
ProjectObjectives:
•UnderstandhowpublicWANswork.
•Reaserachroutingmechanismandroutingprotocols.
•InvestigateIPsectoauthenticateandencryptdatastream.
•ImplementIPsecoversimulatedWANTopology.
•Analysesecure/unsecureTCPstream.
Abstract:
SecuringaVPNtracisquiteimportantandSecuringaVPNtracisquiteimportantand
criticaltomanyorganizations,especially
whenconsideringthatVPN connection
mostlyusesapublicnetworkstofunction,
thereforeIPsecisoneofthemostimportant
protocolscametohelpachievingthisgoal.
IPsecVPNTunnel
SecuringaconnectionoverWANLink
AjmanUniversityofScience&Technology
CollegeofInformationTechnology
GRADUATIONPROJECT
Supervisedby:Mr.FerasSamarrai
Dept.ofNetworking&Security

More Related Content

What's hot

Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationAchim Friedland
 
36
3636
PhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhD Thesis NS2 Projects
PhD Thesis NS2 Projects
Phdtopiccom
 
52
5252
Aircrack
AircrackAircrack
Postgraduate Projects in NS2
Postgraduate Projects in NS2Postgraduate Projects in NS2
Postgraduate Projects in NS2
Phdtopiccom
 
Kracking WPA2
Kracking WPA2Kracking WPA2
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Wpa3
Wpa3Wpa3
Highly Autonomous Self Learning AI Agent
Highly Autonomous Self Learning AI AgentHighly Autonomous Self Learning AI Agent
Highly Autonomous Self Learning AI Agent
Raghavendran G
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
barcamp.my
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
 
Blackhole Attack Network Project Topics
Blackhole Attack Network Project TopicsBlackhole Attack Network Project Topics
Blackhole Attack Network Project Topics
Network Simulation Tools
 
Network Engineering Projects in NS3
 Network Engineering Projects in NS3 Network Engineering Projects in NS3
Network Engineering Projects in NS3
Phdtopiccom
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
vishnuRajan20
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecway Technologies
 

What's hot (18)

Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network Virtualization
 
36
3636
36
 
PhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhD Thesis NS2 Projects
PhD Thesis NS2 Projects
 
52
5252
52
 
Network security
Network securityNetwork security
Network security
 
Aircrack
AircrackAircrack
Aircrack
 
Postgraduate Projects in NS2
Postgraduate Projects in NS2Postgraduate Projects in NS2
Postgraduate Projects in NS2
 
Kracking WPA2
Kracking WPA2Kracking WPA2
Kracking WPA2
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Wpa3
Wpa3Wpa3
Wpa3
 
Highly Autonomous Self Learning AI Agent
Highly Autonomous Self Learning AI AgentHighly Autonomous Self Learning AI Agent
Highly Autonomous Self Learning AI Agent
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Blackhole Attack Network Project Topics
Blackhole Attack Network Project TopicsBlackhole Attack Network Project Topics
Blackhole Attack Network Project Topics
 
Network Engineering Projects in NS3
 Network Engineering Projects in NS3 Network Engineering Projects in NS3
Network Engineering Projects in NS3
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 

Viewers also liked

Ai̇ds
Ai̇dsAi̇ds
Google
GoogleGoogle
Production schedule
Production scheduleProduction schedule
Production schedule
MatthewMilan
 
Digital storytelling
Digital storytellingDigital storytelling
Digital storytellingMike Hallgren
 
BiPday 2014 -- Ceci Michelangelo
BiPday 2014 -- Ceci MichelangeloBiPday 2014 -- Ceci Michelangelo
BiPday 2014 -- Ceci Michelangeloeventi-ITBbari
 
прикидка результата действия 5 класс
прикидка  результата действия 5 классприкидка  результата действия 5 класс
прикидка результата действия 5 класс
Алексей Вахонин
 
Teaching staff concerns about academic integrity
Teaching staff concerns about academic integrityTeaching staff concerns about academic integrity
Teaching staff concerns about academic integrity
Sharon Flynn
 
Over parenting is harmful for children
Over parenting is harmful for children Over parenting is harmful for children
Over parenting is harmful for children
Shadman Ameen
 
Cocos2d-x(JS)の紹介
Cocos2d-x(JS)の紹介Cocos2d-x(JS)の紹介
Cocos2d-x(JS)の紹介
Tomoaki Shimizu
 
Lousada
LousadaLousada
How to Effectively Communicate this Holiday Season with Stress in the Air
How to Effectively Communicate this Holiday Season with Stress in the AirHow to Effectively Communicate this Holiday Season with Stress in the Air
How to Effectively Communicate this Holiday Season with Stress in the Air
The Happiness Alliance - home of the Happiness Index
 

Viewers also liked (14)

Ai̇ds
Ai̇dsAi̇ds
Ai̇ds
 
Google
GoogleGoogle
Google
 
Production schedule
Production scheduleProduction schedule
Production schedule
 
Digital storytelling
Digital storytellingDigital storytelling
Digital storytelling
 
BiPday 2014 -- Ceci Michelangelo
BiPday 2014 -- Ceci MichelangeloBiPday 2014 -- Ceci Michelangelo
BiPday 2014 -- Ceci Michelangelo
 
Seminar design
Seminar designSeminar design
Seminar design
 
прикидка результата действия 5 класс
прикидка  результата действия 5 классприкидка  результата действия 5 класс
прикидка результата действия 5 класс
 
Teaching staff concerns about academic integrity
Teaching staff concerns about academic integrityTeaching staff concerns about academic integrity
Teaching staff concerns about academic integrity
 
Bodega mod
Bodega modBodega mod
Bodega mod
 
TESTLINK INTEGRATOR
TESTLINK INTEGRATORTESTLINK INTEGRATOR
TESTLINK INTEGRATOR
 
Over parenting is harmful for children
Over parenting is harmful for children Over parenting is harmful for children
Over parenting is harmful for children
 
Cocos2d-x(JS)の紹介
Cocos2d-x(JS)の紹介Cocos2d-x(JS)の紹介
Cocos2d-x(JS)の紹介
 
Lousada
LousadaLousada
Lousada
 
How to Effectively Communicate this Holiday Season with Stress in the Air
How to Effectively Communicate this Holiday Season with Stress in the AirHow to Effectively Communicate this Holiday Season with Stress in the Air
How to Effectively Communicate this Holiday Season with Stress in the Air
 

Similar to Poster-A4

Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3
Farzaneh Pakzad
 
5G Core Network - ZTE 5g Cloude ServCore
5G Core Network - ZTE 5g Cloude ServCore5G Core Network - ZTE 5g Cloude ServCore
5G Core Network - ZTE 5g Cloude ServCore
ITU
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
DATA SECURITY SOLUTIONS
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
ratthaslip ranokphanuwat
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
ICT Lab Overview
ICT Lab OverviewICT Lab Overview
ICT Lab Overview
Antonio Marcos Alberti
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
Dheeraj Giri
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemDCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
rudndccn
 
Major presentation
Major presentationMajor presentation
Major presentation
ashishg251
 
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
moggdede
 
Slideshare
SlideshareSlideshare
Slideshare
Somesh Ransubhe
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
ThomasGraf40
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and man
Manigandan BE
 
Spring sim 2010-riley
Spring sim 2010-rileySpring sim 2010-riley
Spring sim 2010-rileySopna Sumāto
 

Similar to Poster-A4 (20)

Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3
 
5G Core Network - ZTE 5g Cloude ServCore
5G Core Network - ZTE 5g Cloude ServCore5G Core Network - ZTE 5g Cloude ServCore
5G Core Network - ZTE 5g Cloude ServCore
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
 
V P N
V P NV P N
V P N
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
ICT Lab Overview
ICT Lab OverviewICT Lab Overview
ICT Lab Overview
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemDCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
 
Major presentation
Major presentationMajor presentation
Major presentation
 
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
 
Slideshare
SlideshareSlideshare
Slideshare
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and man
 
Spring sim 2010-riley
Spring sim 2010-rileySpring sim 2010-riley
Spring sim 2010-riley