SlideShare a Scribd company logo
An Effective method for Network Security and Improving the
Quality of Service
Submitted by : Purna Chandra Sethi
PhD Scholar
Dept. of CSA
Utkal University
Supervised by : Dr. P. K. Behera
Reader Dept CSA
Utkal University
Ph. D Synopsis Presentation
08/03/15 1/30Ph. D Synopsis Presentation (Dept. CSA), UU
Overview
• What is security?
• Why do we need security?
• What is QoS? Why QoS?
• Common security attacks
• Research Proposal
• Conclusion
08/03/15 2/30
Ph. D Synopsis Presentation (Dept. CSA), UU
What is Security?
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building
security if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent interrupt or
attack.
• 3. Measures adopted, by a business or homeowner, to prevent
a crime such as theft or attack: Security was lax at the firm's
smaller plant.
08/03/15 3/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Why do we need security?
• Protect vital information while still allowing
access to those who need it
– Trade secrets, medical records, etc.
• Provide authentication and access control for
resources
– Ex: AES
• Guarantee availability of resources
– Ex: 99.999% reliability
08/03/15 4/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Data Security & Network Security
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 5/30
Common security attacks in IPv4
• Eavesdropping
• Virus
• Worms
• Trojans
• Phishing
• IP Spoofing
• Denial of Service
etc…
08/03/15 6/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Eavesdropping
• Interception of communications by an unauthorized party is
called eavesdropping.
• Passive eavesdropping is when the person only secretly listens
to the networked messages.
• Active eavesdropping is when the intruder listens and inserts
something into the communication stream. This can lead to the
messages being distorted. Sensitive information can be stolen
this way.
• Protocols defend against Eavesdropping attacks by using
encryption for confidentiality.
• Eg: Man in the middle attack
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
7/30
VIRUS
• Computer virus refers to a program which
damages computer systems and/or destroys or
erases data files
• Virus are self-replicating programs that use
files to infect the information. Once a file is
opened, the virus will activate the system.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
8/30
WORM
• Worm are self replicating replicating in nature.‐
• There are two main types of worms, mass mailing‐
worms and network-aware worms.
• Mass mailing worms use email as a means to
infect other computers.
• Network aware worm selects a target and once‐
the worm accesses the target host, it can infect it
by means of a Trojan or otherwise.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 9/30
Trojan Horse
• Trojan Horse is a malicious program that
usually comes with monitoring tools and key
loggers.
• It enters into the system with general program
elements and then generates it replica.
• It can be used to control the total system by an
intruder present remotely.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
10/30
Phishing
• Phishing is an attempt to obtain confidential
information from an individual, group, or
organization.
• Phishers trick users into disclosing personal
data, such as credit card numbers, online
banking credentials, and other sensitive
information.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
11/30
IP Spoofing
• Spoofing means to have the address of the computer
mirror the address of a trusted computer in order to
gain access to other computers.
• The identity of the intruder is hidden by different
means making detection and prevention difficult.
With the current IP protocol technology, IPspoofed
packets cannot be eliminated.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
12/30
Denial of Service
• Denial of Service is an attack when the system receiving too many
requests cannot return communication with the requestors. The main
purpose of DoS is to make network service unusable, usually by
overloading the server or network.
• Until the handshaking is complete, the system consumes resources.
Eventually, the system cannot respond to any more requests
rendering it without service.
• Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
etc …
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 13/30
Technologies for Internet Security
• Cryptographic Systems
• Firewall
• Intrusion Detection System
• Anti-Malware Software and scanners
• Secure Socket Layer
etc…
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 14/30
Cryptographic Systems
• It involved the use of codes and ciphers to transform
information into unintelligible data.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 15/30
Firewalls
• Firewall is a typical border control mechanism or perimeter
defense.
• The purpose of a firewall is to block traffic from the outside,
but it could also be used to block traffic from the inside.
• A firewall is the front line defense mechanism against
intruders.
• It is a system designed to prevent unauthorized access to or
from a private network.
• Firewalls can be implemented in both hardware and software,
or a combination of both
08/03/15 16/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Intrusion Detection System
• Used to monitor for “suspicious activity” on a network and
Can protect against known software exploits, like buffer
overflows.
• IDS systems can be software and hardware devices used to
detect an attack.
• IDS products are used to monitor connection in determining
whether attacks are been launched.
• Some IDS systems just monitor and alert of an attack, whereas
others try to block the attack.
• Open Source IDS: Snort, www.snort.org
08/03/15 17/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Anti Malware Software and scanners‐
• Viruses, worms and Trojan horses are all
examples of malicious software, or Malware.
• Anti Malware tools are used to detect them‐
and cure an infected system.
• Eg: Anti- virus softwares
08/03/15 18/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Secure Socket Layer (SSL)
• The Secure Socket Layer (SSL) is a suite of protocols that
is a standard way to achieve a good level of security
between a web browser and a website.
• SSL is designed to create a secure channel, between a
web browser and the web server, so that any information
exchanged is protected within the secured channel.
• SSL provides authentication of clients to server through
the use of certificates. Clients present a certificate to the
server to prove their identity.
08/03/15 19/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Security Issues of IP Protocol IPv6
1. Header manipulation issues
2. Flooding issues
3. Mobility issues
08/03/15 20/30
Ph. D Synopsis Presentation (Dept. CSA), UU
Security in different Networks
1. Firewalls that detect and report intrusion attempts
2. Sophisticated virus checking at the firewall
3. Enforced rules for employee opening of email
attachments
4. Encryption for all connections and data transfers
5. Authentication by synchronized, timed passwords
or security certificates
08/03/15 21/30
Ph. D Synopsis Presentation (Dept. CSA), UU
PROPOSED STATEMENT
The research proposal is based on two types of
issues:
•Enhancement of Data Security by increasing the
level of confidentiality.
•Improving the Quality of Service for faster and
accurate data transmission.
08/03/15 22/30
Ph. D Synopsis Presentation (Dept. CSA), UU
PROPOSED STATEMENT contd…
• RSA, AES, IDEA uses single key value for encryption.
Though RSA provides a good level of security, still it can be
cracked.
• Multi signer key implementation by means of ring signature
so that multiple keys can be generated using s single prime
number shared by the group members but the identity of the
key generator can be secure and it will be convertible i.e. only
the actual message signer will be capable of generating the
signature.
• Cross- organizational key assignment by mean of multiple key
implementation at a time, so that using both the keys at a time
the information can be accessed. It will work like a locker
system.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
23/30
Enhancement of Data Security
Improving the Quality of Service
• The quality of service for streaming image,
audio and videos are much difficult than the
standard text.
• Dynamic assignment of bandwidth for proper
utilization of resources.
• The protocols does not have the functionality
of dynamic QoS that changes based on the
type of data being communicated.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 24/30
PROPOSED STATEMENT contd…
RESEARCH PERSUED
• In paper [10], I have proposed a group
communication technique based on clustering
approach called incremental clustering.
• It guarantees the transmission of information
to the destination.
• It was implemented using the different ARQ
protocols .
High Impact Event Processing using Incremetal Clustering in Unsupervised Feature Space through Genetic
algorithm by Selective Repeat ARQ protocol [ICCCT – 2011 (IEEE International Conference) pp – 310 –
315]
08/03/15 25/30
Ph. D Synopsis Presentation (Dept. CSA), UU
RESEARCH PERSUED Contd…
• In paper [12], I had proposed a dynamic mechanism
called UPnP (Universal Plug and Play) mechanism.
• Here, each user has to register in the group before any
type of operation. After that it can be released such
that unnecessarily the candidate has to participate in
each type of activities. This provides well utilization
of resources of a group connected in the network.
UPnP and Secure Group communication Technique for Zero-configuration Environment construction using
Incremental Clustering [International Journal of Engineering & Technology (IJERT) – ISSN : 2278 –
0181, Vol -02, Issue -12, December – 2013 ]
08/03/15 26/30
Ph. D Synopsis Presentation (Dept. CSA), UU
CONCLUSION
• Network security and QoS is an important field that is
increasingly getting attention as the Internet expands.
• Due to the complex set of applications being executed over
Internet, the security issues such that information can’t be
leaked.
• QoS has to be enhanced for smarter and faster application
processing.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
27/30
Reference
[1] Kartalopoulos, S. V., "Differentiating Data Security and Network Security,"
Communications, 2008. ICC '08. IEEE International Conference on, pp.1469 1473, 19‐ ‐
23 May 2008
[2] Molva, R., Institut Eurecom, “ Internet Security Architecture”, in Computer Networks
& ISDN Systems Journal, vol. 31, pp. 787 804, April 1999‐
[3] Sotillo S., East Carolina University, “ IPv6 security issues ”, August 2006,
www.infosecwriters.com/text_resources/pdf/IPv6_SSot illo.pdf.
[4] “Improving Security,” http://www.cert.org/tech_tips, 2006.
[5] Andress J., “IPv6: the next internet protocol”, April 2005, www.usenix.com
/publications /login / 2005 04/pdfs/andress0504.pdf.‐
[6] Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling &
Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no.,
pp.77 82, 13 15 May 2008‐ ‐
[7] Marin, G.A., "Network security basics," Security & Privacy, IEEE , vol.3, no.6, pp. 68‐
72, Nov. Dec. 2005‐
[8] Tyson, J., ”How Virtual private networks work,” ttp://www.howstuffworks.com/vpn.htm
.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 28/30
Reference Contd…
• [9] Jian Ren, Member, IEEE, and Lein Harn: Generalized Ring Signatures, IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5, NO. 3,
JULY-SEPTEMBER 2008.
• [10] P. C. Sethi, C. Dash: High Impact Event Processing using Incremental Clustering in
Unsupervised Feature Space through Genetic algorithm by Selective Repeat ARQ protocol:
ICCCT- 2nd IEEE Conference – 2011, pp. 310-315.
• [11] Atul Kamble, Incremental Clustering in Data Miningusing Genetic Algorithm,
International Journal of Computer Theory and Engineering, Vol. 2, No. 3, June, 2010. 1793-
8201.
• [12] P. C. Sethi: “UPnP and Secure Group communication Technique for Zero-configuration
Environment construction using Incremental Clustering”, International Journal of Engineering
Research & Technology (IJERT), ISSN: 2278 – 0181, Vol. 02 Issue 12, December – 2013.
• [13] Tzu-Fang Sheu, Nen-Fu Huang, and Hsiao-Ping Lee, “In-Depth Packet Inspection Using
a Hierarchical Pattern Matching Algorithm”, IEEE TRANSACTIONS ON DEPENDABLE
AND SECURE COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2010, Page175-188
• [14] Kaoru Kurosawa, Member, IEEE, and Tsuyoshi Takagi, “One-Wayness Equivalent to
General Factoring”, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO.
9, SEPTEMBER 2009, Page 4249 - 4262
• [15] R.L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret, Advances in
Cryptology”, ASIACRYPT, 2001
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 29/30
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 30/30

More Related Content

What's hot

Ccsit cyberlympics 2017 workshop 3 - presentation
Ccsit cyberlympics 2017  workshop 3 - presentationCcsit cyberlympics 2017  workshop 3 - presentation
Ccsit cyberlympics 2017 workshop 3 - presentation
Nasir Bhutta
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
theijes
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta
 
Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492IJRAT
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
amiable_indian
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
CSCJournals
 
online investigation
online investigationonline investigation
online investigationfortune777
 
Firewalls
FirewallsFirewalls
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
Pritesh Ranjan
 
F0371046050
F0371046050F0371046050
F0371046050
inventionjournals
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
Sujeet Kumar
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
Preeti Yadav
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 

What's hot (19)

Ccsit cyberlympics 2017 workshop 3 - presentation
Ccsit cyberlympics 2017  workshop 3 - presentationCcsit cyberlympics 2017  workshop 3 - presentation
Ccsit cyberlympics 2017 workshop 3 - presentation
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Paper id 24201492
Paper id 24201492Paper id 24201492
Paper id 24201492
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
online investigation
online investigationonline investigation
online investigation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
F0371046050
F0371046050F0371046050
F0371046050
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 

Viewers also liked

Format Of Synopsis
Format Of SynopsisFormat Of Synopsis
Format Of Synopsis
Abdul Rahman Khawaja
 
Synopsis of project FOUR WHEELS STEERING SYSTEM
Synopsis of project FOUR WHEELS STEERING SYSTEMSynopsis of project FOUR WHEELS STEERING SYSTEM
Synopsis of project FOUR WHEELS STEERING SYSTEM
Parvind Gupta
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
Prof. Mridul Panditrao
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsis
Sheshank Priya
 
PROJECT Room envirment monitoring system synopsis
PROJECT  Room envirment monitoring system synopsisPROJECT  Room envirment monitoring system synopsis
PROJECT Room envirment monitoring system synopsis
prashant shukla
 
Happyness Presentation
Happyness PresentationHappyness Presentation
Happyness Presentation
meghnapegu
 
Presentation1
Presentation1Presentation1
Presentation1
ARCHANA S
 
Micro-Minis of Happiness
Micro-Minis of HappinessMicro-Minis of Happiness
Speech presentation amber palassis
Speech presentation  amber palassisSpeech presentation  amber palassis
Speech presentation amber palassis
Amber Palassis
 
Day 1 1115_alexander_kjerulf
Day 1 1115_alexander_kjerulfDay 1 1115_alexander_kjerulf
Day 1 1115_alexander_kjerulfTheFocusGroup
 
The 3 Components of Happiness by Anesh Jagtiani
The 3 Components of Happiness by Anesh JagtianiThe 3 Components of Happiness by Anesh Jagtiani
The 3 Components of Happiness by Anesh Jagtiani
Quantum Learning
 
How to write your synopsis
How to write your synopsisHow to write your synopsis
How to write your synopsis
Dr-Maryam Khan
 
Metodo estatico equivalente jessica garcia
Metodo estatico equivalente jessica garciaMetodo estatico equivalente jessica garcia
Metodo estatico equivalente jessica garcia
JESSICA GARCIA
 
Presentacion Stitanques
Presentacion StitanquesPresentacion Stitanques
Presentacion Stitanques
Andres Garcia
 
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...
encartaciones
 
Navidad Supermerchandising
Navidad SupermerchandisingNavidad Supermerchandising
Navidad Supermerchandisingdobleessa
 
first page of report ,synopsis of govt engineering college ,ajmer
first page of report ,synopsis of govt engineering college ,ajmerfirst page of report ,synopsis of govt engineering college ,ajmer
first page of report ,synopsis of govt engineering college ,ajmer
Veni Dan
 

Viewers also liked (20)

Synopsis format
Synopsis formatSynopsis format
Synopsis format
 
Format Of Synopsis
Format Of SynopsisFormat Of Synopsis
Format Of Synopsis
 
Synopsis of project FOUR WHEELS STEERING SYSTEM
Synopsis of project FOUR WHEELS STEERING SYSTEMSynopsis of project FOUR WHEELS STEERING SYSTEM
Synopsis of project FOUR WHEELS STEERING SYSTEM
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsis
 
PROJECT Room envirment monitoring system synopsis
PROJECT  Room envirment monitoring system synopsisPROJECT  Room envirment monitoring system synopsis
PROJECT Room envirment monitoring system synopsis
 
Happyness Presentation
Happyness PresentationHappyness Presentation
Happyness Presentation
 
Presentation1
Presentation1Presentation1
Presentation1
 
Micro-Minis of Happiness
Micro-Minis of HappinessMicro-Minis of Happiness
Micro-Minis of Happiness
 
Speech presentation amber palassis
Speech presentation  amber palassisSpeech presentation  amber palassis
Speech presentation amber palassis
 
Day 1 1115_alexander_kjerulf
Day 1 1115_alexander_kjerulfDay 1 1115_alexander_kjerulf
Day 1 1115_alexander_kjerulf
 
The 3 Components of Happiness by Anesh Jagtiani
The 3 Components of Happiness by Anesh JagtianiThe 3 Components of Happiness by Anesh Jagtiani
The 3 Components of Happiness by Anesh Jagtiani
 
How to write your synopsis
How to write your synopsisHow to write your synopsis
How to write your synopsis
 
Metodo estatico equivalente jessica garcia
Metodo estatico equivalente jessica garciaMetodo estatico equivalente jessica garcia
Metodo estatico equivalente jessica garcia
 
Presentacion Stitanques
Presentacion StitanquesPresentacion Stitanques
Presentacion Stitanques
 
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...
 
Frente 0005
Frente 0005Frente 0005
Frente 0005
 
Navidad Supermerchandising
Navidad SupermerchandisingNavidad Supermerchandising
Navidad Supermerchandising
 
Jesica gonzales
Jesica gonzales Jesica gonzales
Jesica gonzales
 
first page of report ,synopsis of govt engineering college ,ajmer
first page of report ,synopsis of govt engineering college ,ajmerfirst page of report ,synopsis of govt engineering college ,ajmer
first page of report ,synopsis of govt engineering college ,ajmer
 

Similar to Synopsis presentation uu Purna Chandra Sethi

UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
VishwanathMahalle
 
2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)geeksec80
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
Dr. Shivashankar
 
2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysisreachsapan
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
Baggam Sailusha
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
Ankit Gupta
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
IRJET Journal
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
Priyamvada Singh
 
Network security
Network securityNetwork security
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
Pvrtechnologies Nellore
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
 

Similar to Synopsis presentation uu Purna Chandra Sethi (20)

UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis
 
A05510105
A05510105A05510105
A05510105
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
Network security
Network securityNetwork security
Network security
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
 

Recently uploaded

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

Synopsis presentation uu Purna Chandra Sethi

  • 1. An Effective method for Network Security and Improving the Quality of Service Submitted by : Purna Chandra Sethi PhD Scholar Dept. of CSA Utkal University Supervised by : Dr. P. K. Behera Reader Dept CSA Utkal University Ph. D Synopsis Presentation 08/03/15 1/30Ph. D Synopsis Presentation (Dept. CSA), UU
  • 2. Overview • What is security? • Why do we need security? • What is QoS? Why QoS? • Common security attacks • Research Proposal • Conclusion 08/03/15 2/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 3. What is Security? 1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as: • 1. A group or department of private guards: Call building security if a visitor acts suspicious. • 2. Measures adopted by a government to prevent interrupt or attack. • 3. Measures adopted, by a business or homeowner, to prevent a crime such as theft or attack: Security was lax at the firm's smaller plant. 08/03/15 3/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 4. Why do we need security? • Protect vital information while still allowing access to those who need it – Trade secrets, medical records, etc. • Provide authentication and access control for resources – Ex: AES • Guarantee availability of resources – Ex: 99.999% reliability 08/03/15 4/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 5. Data Security & Network Security 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 5/30
  • 6. Common security attacks in IPv4 • Eavesdropping • Virus • Worms • Trojans • Phishing • IP Spoofing • Denial of Service etc… 08/03/15 6/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 7. Eavesdropping • Interception of communications by an unauthorized party is called eavesdropping. • Passive eavesdropping is when the person only secretly listens to the networked messages. • Active eavesdropping is when the intruder listens and inserts something into the communication stream. This can lead to the messages being distorted. Sensitive information can be stolen this way. • Protocols defend against Eavesdropping attacks by using encryption for confidentiality. • Eg: Man in the middle attack 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 7/30
  • 8. VIRUS • Computer virus refers to a program which damages computer systems and/or destroys or erases data files • Virus are self-replicating programs that use files to infect the information. Once a file is opened, the virus will activate the system. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 8/30
  • 9. WORM • Worm are self replicating replicating in nature.‐ • There are two main types of worms, mass mailing‐ worms and network-aware worms. • Mass mailing worms use email as a means to infect other computers. • Network aware worm selects a target and once‐ the worm accesses the target host, it can infect it by means of a Trojan or otherwise. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 9/30
  • 10. Trojan Horse • Trojan Horse is a malicious program that usually comes with monitoring tools and key loggers. • It enters into the system with general program elements and then generates it replica. • It can be used to control the total system by an intruder present remotely. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 10/30
  • 11. Phishing • Phishing is an attempt to obtain confidential information from an individual, group, or organization. • Phishers trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 11/30
  • 12. IP Spoofing • Spoofing means to have the address of the computer mirror the address of a trusted computer in order to gain access to other computers. • The identity of the intruder is hidden by different means making detection and prevention difficult. With the current IP protocol technology, IPspoofed packets cannot be eliminated. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 12/30
  • 13. Denial of Service • Denial of Service is an attack when the system receiving too many requests cannot return communication with the requestors. The main purpose of DoS is to make network service unusable, usually by overloading the server or network. • Until the handshaking is complete, the system consumes resources. Eventually, the system cannot respond to any more requests rendering it without service. • Many different kinds of DoS attacks – SYN flooding – SMURF – Distributed attacks etc … 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 13/30
  • 14. Technologies for Internet Security • Cryptographic Systems • Firewall • Intrusion Detection System • Anti-Malware Software and scanners • Secure Socket Layer etc… 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 14/30
  • 15. Cryptographic Systems • It involved the use of codes and ciphers to transform information into unintelligible data. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 15/30
  • 16. Firewalls • Firewall is a typical border control mechanism or perimeter defense. • The purpose of a firewall is to block traffic from the outside, but it could also be used to block traffic from the inside. • A firewall is the front line defense mechanism against intruders. • It is a system designed to prevent unauthorized access to or from a private network. • Firewalls can be implemented in both hardware and software, or a combination of both 08/03/15 16/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 17. Intrusion Detection System • Used to monitor for “suspicious activity” on a network and Can protect against known software exploits, like buffer overflows. • IDS systems can be software and hardware devices used to detect an attack. • IDS products are used to monitor connection in determining whether attacks are been launched. • Some IDS systems just monitor and alert of an attack, whereas others try to block the attack. • Open Source IDS: Snort, www.snort.org 08/03/15 17/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 18. Anti Malware Software and scanners‐ • Viruses, worms and Trojan horses are all examples of malicious software, or Malware. • Anti Malware tools are used to detect them‐ and cure an infected system. • Eg: Anti- virus softwares 08/03/15 18/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 19. Secure Socket Layer (SSL) • The Secure Socket Layer (SSL) is a suite of protocols that is a standard way to achieve a good level of security between a web browser and a website. • SSL is designed to create a secure channel, between a web browser and the web server, so that any information exchanged is protected within the secured channel. • SSL provides authentication of clients to server through the use of certificates. Clients present a certificate to the server to prove their identity. 08/03/15 19/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 20. Security Issues of IP Protocol IPv6 1. Header manipulation issues 2. Flooding issues 3. Mobility issues 08/03/15 20/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 21. Security in different Networks 1. Firewalls that detect and report intrusion attempts 2. Sophisticated virus checking at the firewall 3. Enforced rules for employee opening of email attachments 4. Encryption for all connections and data transfers 5. Authentication by synchronized, timed passwords or security certificates 08/03/15 21/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 22. PROPOSED STATEMENT The research proposal is based on two types of issues: •Enhancement of Data Security by increasing the level of confidentiality. •Improving the Quality of Service for faster and accurate data transmission. 08/03/15 22/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 23. PROPOSED STATEMENT contd… • RSA, AES, IDEA uses single key value for encryption. Though RSA provides a good level of security, still it can be cracked. • Multi signer key implementation by means of ring signature so that multiple keys can be generated using s single prime number shared by the group members but the identity of the key generator can be secure and it will be convertible i.e. only the actual message signer will be capable of generating the signature. • Cross- organizational key assignment by mean of multiple key implementation at a time, so that using both the keys at a time the information can be accessed. It will work like a locker system. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 23/30 Enhancement of Data Security
  • 24. Improving the Quality of Service • The quality of service for streaming image, audio and videos are much difficult than the standard text. • Dynamic assignment of bandwidth for proper utilization of resources. • The protocols does not have the functionality of dynamic QoS that changes based on the type of data being communicated. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 24/30 PROPOSED STATEMENT contd…
  • 25. RESEARCH PERSUED • In paper [10], I have proposed a group communication technique based on clustering approach called incremental clustering. • It guarantees the transmission of information to the destination. • It was implemented using the different ARQ protocols . High Impact Event Processing using Incremetal Clustering in Unsupervised Feature Space through Genetic algorithm by Selective Repeat ARQ protocol [ICCCT – 2011 (IEEE International Conference) pp – 310 – 315] 08/03/15 25/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 26. RESEARCH PERSUED Contd… • In paper [12], I had proposed a dynamic mechanism called UPnP (Universal Plug and Play) mechanism. • Here, each user has to register in the group before any type of operation. After that it can be released such that unnecessarily the candidate has to participate in each type of activities. This provides well utilization of resources of a group connected in the network. UPnP and Secure Group communication Technique for Zero-configuration Environment construction using Incremental Clustering [International Journal of Engineering & Technology (IJERT) – ISSN : 2278 – 0181, Vol -02, Issue -12, December – 2013 ] 08/03/15 26/30 Ph. D Synopsis Presentation (Dept. CSA), UU
  • 27. CONCLUSION • Network security and QoS is an important field that is increasingly getting attention as the Internet expands. • Due to the complex set of applications being executed over Internet, the security issues such that information can’t be leaked. • QoS has to be enhanced for smarter and faster application processing. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 27/30
  • 28. Reference [1] Kartalopoulos, S. V., "Differentiating Data Security and Network Security," Communications, 2008. ICC '08. IEEE International Conference on, pp.1469 1473, 19‐ ‐ 23 May 2008 [2] Molva, R., Institut Eurecom, “ Internet Security Architecture”, in Computer Networks & ISDN Systems Journal, vol. 31, pp. 787 804, April 1999‐ [3] Sotillo S., East Carolina University, “ IPv6 security issues ”, August 2006, www.infosecwriters.com/text_resources/pdf/IPv6_SSot illo.pdf. [4] “Improving Security,” http://www.cert.org/tech_tips, 2006. [5] Andress J., “IPv6: the next internet protocol”, April 2005, www.usenix.com /publications /login / 2005 04/pdfs/andress0504.pdf.‐ [6] Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77 82, 13 15 May 2008‐ ‐ [7] Marin, G.A., "Network security basics," Security & Privacy, IEEE , vol.3, no.6, pp. 68‐ 72, Nov. Dec. 2005‐ [8] Tyson, J., ”How Virtual private networks work,” ttp://www.howstuffworks.com/vpn.htm . 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 28/30
  • 29. Reference Contd… • [9] Jian Ren, Member, IEEE, and Lein Harn: Generalized Ring Signatures, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5, NO. 3, JULY-SEPTEMBER 2008. • [10] P. C. Sethi, C. Dash: High Impact Event Processing using Incremental Clustering in Unsupervised Feature Space through Genetic algorithm by Selective Repeat ARQ protocol: ICCCT- 2nd IEEE Conference – 2011, pp. 310-315. • [11] Atul Kamble, Incremental Clustering in Data Miningusing Genetic Algorithm, International Journal of Computer Theory and Engineering, Vol. 2, No. 3, June, 2010. 1793- 8201. • [12] P. C. Sethi: “UPnP and Secure Group communication Technique for Zero-configuration Environment construction using Incremental Clustering”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278 – 0181, Vol. 02 Issue 12, December – 2013. • [13] Tzu-Fang Sheu, Nen-Fu Huang, and Hsiao-Ping Lee, “In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2010, Page175-188 • [14] Kaoru Kurosawa, Member, IEEE, and Tsuyoshi Takagi, “One-Wayness Equivalent to General Factoring”, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009, Page 4249 - 4262 • [15] R.L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret, Advances in Cryptology”, ASIACRYPT, 2001 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 29/30
  • 30. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 30/30