Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/303498
Title: Defensive network architecture and augmentation of security systems in the vulnerable cyber shield
Researcher: Selvamani, D
Guide(s): Selvi, V
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Mother Teresa Womens University
Completed Date: 2020
Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the importance of security, types of attacks in the networks. The Intrusion Detection System (IDS) can be used broadly for securing the network. Intrusion detection systems (IDS) are typically positioned laterally through former protecting safety automation, like access control and verification, as a subsequent line of resistance that guard s data classifications. Feature selection is employed to diminish the number of features in various applications where data has more than hundreds of attributes. Essential or relevant attribute recognition has converted a vital job to utilize data mining algorithms efficiently in today world situations. Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This research work presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks. newline
Pagination: xvii, 206p.
URI: http://hdl.handle.net/10603/303498
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File152.56 kBAdobe PDFView/Open
02_certificate.pdf129.58 kBAdobe PDFView/Open
03_contents.pdf90.6 kBAdobe PDFView/Open
04_chapter 1.pdf330.3 kBAdobe PDFView/Open
05_chapter 2.pdf308.78 kBAdobe PDFView/Open
06_chapter 3.pdf661.59 kBAdobe PDFView/Open
07-chapter 4.pdf896.11 kBAdobe PDFView/Open
08_chapter 5.pdf801.31 kBAdobe PDFView/Open
09_chapter 6.pdf2.17 MBAdobe PDFView/Open
10_chapter 7.pdf148.72 kBAdobe PDFView/Open
11_chapter 8.pdf184.34 kBAdobe PDFView/Open
12_bibliography.pdf580.69 kBAdobe PDFView/Open
80_recommendation.pdf218.83 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: