Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/303498
Title: | Defensive network architecture and augmentation of security systems in the vulnerable cyber shield |
Researcher: | Selvamani, D |
Guide(s): | Selvi, V |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Mother Teresa Womens University |
Completed Date: | 2020 |
Abstract: | Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the importance of security, types of attacks in the networks. The Intrusion Detection System (IDS) can be used broadly for securing the network. Intrusion detection systems (IDS) are typically positioned laterally through former protecting safety automation, like access control and verification, as a subsequent line of resistance that guard s data classifications. Feature selection is employed to diminish the number of features in various applications where data has more than hundreds of attributes. Essential or relevant attribute recognition has converted a vital job to utilize data mining algorithms efficiently in today world situations. Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This research work presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks. newline |
Pagination: | xvii, 206p. |
URI: | http://hdl.handle.net/10603/303498 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 152.56 kB | Adobe PDF | View/Open |
02_certificate.pdf | 129.58 kB | Adobe PDF | View/Open | |
03_contents.pdf | 90.6 kB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 330.3 kB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 308.78 kB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 661.59 kB | Adobe PDF | View/Open | |
07-chapter 4.pdf | 896.11 kB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 801.31 kB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 2.17 MB | Adobe PDF | View/Open | |
10_chapter 7.pdf | 148.72 kB | Adobe PDF | View/Open | |
11_chapter 8.pdf | 184.34 kB | Adobe PDF | View/Open | |
12_bibliography.pdf | 580.69 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 218.83 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: