Please use this identifier to cite or link to this item:
Title: A critical study of counteract attempts at unauthorized use of information systems
Researcher: Yadav, Kusum
Guide(s): Rakesh Kumar
Keywords: Information Systems
Network Security
OSI Model
Proactive Security
Upload Date: 17-May-2012
University: Shri Jagdishprasad Jhabarmal Tibarewala University
Completed Date: 2012
Abstract: The security in computer networks is a rapidly growing area of concern. Most of the valuable information resides on the networks, making the network an inevitable entity for survival. All these small networks are connected further to wide area networks which in turn forms the basis of Internet. The Internet is the „world‟s largest collection of networks that reaches universities, government labs, commercial enterprises, and military installations in many countries”. Internet consists primarily of local area networks. The principle method of communication on the Internet is the TCP/IP protocol suite. The Internet, however, is increasingly becoming an environment with multiple protocols. The Internet was an experiment begun in 1968 by the Defense Departments Information Processing Techniques Office to connect computers over a network in order to ensure command and control communications in the event of a nuclear war. The original network was known as the ARPAnet, and the project quickly became a „straight research project without a specific application‟. In the 1980s, the number of local area networks increased significantly and this stimulated rapid growth of interconnections to the ARPAnet and other networks. These networks and interconnections are known today as the Internet. Keeping all this in consideration, it is proposed to design and develop a proactive network surveillance framework. This Framework aims to provide learning vision to the network attacks. The main objective of this research is to bring improved network security through: --Exploring and analyzing various exploit and their detrimental effects on network security, --exploring various honeypots and analyze their working, --development of a proactive network surveillance framework, --creating a bootable enhanced Linux distribution with security scripts and tools (built during this work) to analyze and enhance security, --deployment and testing of the framework,--Learning and monitoring network in real time.
Appears in Departments:Faculty of Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File31.6 kBAdobe PDFView/Open
02_certificates.pdf120.05 kBAdobe PDFView/Open
03_acknowledgement.pdf82.5 kBAdobe PDFView/Open
04_list of figures.pdf144.76 kBAdobe PDFView/Open
05_list of tables.pdf82.5 kBAdobe PDFView/Open
06_contents.pdf24.37 kBAdobe PDFView/Open
07_abstract.pdf141.3 kBAdobe PDFView/Open
08_chapter 1.pdf607.72 kBAdobe PDFView/Open
09_chapter 2.pdf913.23 kBAdobe PDFView/Open
10_chapter 3.pdf386.26 kBAdobe PDFView/Open
11_chapter 4.pdf1.23 MBAdobe PDFView/Open
12_chapter 5.pdf861.04 kBAdobe PDFView/Open
13_chapter 6.pdf854.5 kBAdobe PDFView/Open
14_chapter 7.pdf2.44 MBAdobe PDFView/Open
15_conclusions.pdf316.42 kBAdobe PDFView/Open
16_references.pdf274.84 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.