Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/314861
Title: Proactive Network Surveillance Framework
Researcher: Singh, Maninder
Guide(s): Bawa, Seema and Saxena, S.C.
Keywords: Network Security
Proactive Security
Reactive Security
University: Thapar Institute of Engineering and Technology
Completed Date: 2007
Abstract: Network security paradigm should be the one that permeates the enterprise, including people, processes and technology. Security failures occur when there is presence of weak spots among any of these. An organization which can not detect and remove such weak spots is going to perish. As can be seen around, most of the organizations today apply a few or many of the existing tools and techniques like firewalls, intrusion detection systems, anti-viruses, anti-spywares etc., to safe-guard the systems against hacking community. But as the number of network breaches, from outside as well from inside, are still on rise, much works needs to be done. This work analyzes trends in network security through an investigation of reactive and proactive network security strategies. Many of common practices have been studied, analyzed, compared and reported in this work. Prior to proactive security research, there existed a meager know how about the â who is our enemy?â , â what tools and techniques they use to attack networks?â , â what are their motives to do so?â etc. This knowledge was quite limited and primarily anecdotal. This made it difficult to create, test and deploy integrated security solutions, for better and efficient Network Security. Various exploits and their detrimental effects have been explored, their respective signatures are captured, analyzed and reported in this thesis work. Many open source Honeypots have also been analyzed by configuring them at the workplace. Comparison of features, their respective levels of interactions and risk factors associated with deployment have been focused. Finally, A Proactive Network Surveillance Framework is proposed. The framework consists of five layers, addressing security at various levels, following the onion model of defense in which defense consists of many layers. First layer of the framework: Core Security addresses the physical security issues. This layer also recommends changes at filesystem level to enhance security of the installed framework.
Pagination: 192p.
URI: http://hdl.handle.net/10603/314861
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File42.49 kBAdobe PDFView/Open
02_dedication.pdf63.29 kBAdobe PDFView/Open
03_contents.pdf46.05 kBAdobe PDFView/Open
04_list of figures.pdf46.24 kBAdobe PDFView/Open
05_list of tables.pdf42.43 kBAdobe PDFView/Open
06_certificate.pdf44.04 kBAdobe PDFView/Open
07_acknowledgement.pdf44.82 kBAdobe PDFView/Open
08_abstract.pdf67.76 kBAdobe PDFView/Open
09_chapter1.pdf156.71 kBAdobe PDFView/Open
10_chapter2.pdf1.08 MBAdobe PDFView/Open
11_chapter3.pdf448.17 kBAdobe PDFView/Open
12_chapter4.pdf287.44 kBAdobe PDFView/Open
13_chapter5.pdf415.92 kBAdobe PDFView/Open
14_chapter6.pdf3.3 MBAdobe PDFView/Open
15_chapter7.pdf71.57 kBAdobe PDFView/Open
16_refrences.pdf84.37 kBAdobe PDFView/Open
17_list of publications.pdf63.83 kBAdobe PDFView/Open
80_recommendation.pdf109.87 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: