Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/314861
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2021-02-11T12:04:46Z-
dc.date.available2021-02-11T12:04:46Z-
dc.identifier.urihttp://hdl.handle.net/10603/314861-
dc.description.abstractNetwork security paradigm should be the one that permeates the enterprise, including people, processes and technology. Security failures occur when there is presence of weak spots among any of these. An organization which can not detect and remove such weak spots is going to perish. As can be seen around, most of the organizations today apply a few or many of the existing tools and techniques like firewalls, intrusion detection systems, anti-viruses, anti-spywares etc., to safe-guard the systems against hacking community. But as the number of network breaches, from outside as well from inside, are still on rise, much works needs to be done. This work analyzes trends in network security through an investigation of reactive and proactive network security strategies. Many of common practices have been studied, analyzed, compared and reported in this work. Prior to proactive security research, there existed a meager know how about the â who is our enemy?â , â what tools and techniques they use to attack networks?â , â what are their motives to do so?â etc. This knowledge was quite limited and primarily anecdotal. This made it difficult to create, test and deploy integrated security solutions, for better and efficient Network Security. Various exploits and their detrimental effects have been explored, their respective signatures are captured, analyzed and reported in this thesis work. Many open source Honeypots have also been analyzed by configuring them at the workplace. Comparison of features, their respective levels of interactions and risk factors associated with deployment have been focused. Finally, A Proactive Network Surveillance Framework is proposed. The framework consists of five layers, addressing security at various levels, following the onion model of defense in which defense consists of many layers. First layer of the framework: Core Security addresses the physical security issues. This layer also recommends changes at filesystem level to enhance security of the installed framework.
dc.format.extent192p.
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleProactive Network Surveillance Framework
dc.title.alternative
dc.creator.researcherSingh, Maninder
dc.subject.keywordNetwork Security
dc.subject.keywordProactive Security
dc.subject.keywordReactive Security
dc.description.note
dc.contributor.guideBawa, Seema and Saxena, S.C.
dc.publisher.placePatiala
dc.publisher.universityThapar Institute of Engineering and Technology
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered
dc.date.completed2007
dc.date.awarded
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File42.49 kBAdobe PDFView/Open
02_dedication.pdf63.29 kBAdobe PDFView/Open
03_contents.pdf46.05 kBAdobe PDFView/Open
04_list of figures.pdf46.24 kBAdobe PDFView/Open
05_list of tables.pdf42.43 kBAdobe PDFView/Open
06_certificate.pdf44.04 kBAdobe PDFView/Open
07_acknowledgement.pdf44.82 kBAdobe PDFView/Open
08_abstract.pdf67.76 kBAdobe PDFView/Open
09_chapter1.pdf156.71 kBAdobe PDFView/Open
10_chapter2.pdf1.08 MBAdobe PDFView/Open
11_chapter3.pdf448.17 kBAdobe PDFView/Open
12_chapter4.pdf287.44 kBAdobe PDFView/Open
13_chapter5.pdf415.92 kBAdobe PDFView/Open
14_chapter6.pdf3.3 MBAdobe PDFView/Open
15_chapter7.pdf71.57 kBAdobe PDFView/Open
16_refrences.pdf84.37 kBAdobe PDFView/Open
17_list of publications.pdf63.83 kBAdobe PDFView/Open
80_recommendation.pdf109.87 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: