Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/314861
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2021-02-11T12:04:46Z | - |
dc.date.available | 2021-02-11T12:04:46Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/314861 | - |
dc.description.abstract | Network security paradigm should be the one that permeates the enterprise, including people, processes and technology. Security failures occur when there is presence of weak spots among any of these. An organization which can not detect and remove such weak spots is going to perish. As can be seen around, most of the organizations today apply a few or many of the existing tools and techniques like firewalls, intrusion detection systems, anti-viruses, anti-spywares etc., to safe-guard the systems against hacking community. But as the number of network breaches, from outside as well from inside, are still on rise, much works needs to be done. This work analyzes trends in network security through an investigation of reactive and proactive network security strategies. Many of common practices have been studied, analyzed, compared and reported in this work. Prior to proactive security research, there existed a meager know how about the â who is our enemy?â , â what tools and techniques they use to attack networks?â , â what are their motives to do so?â etc. This knowledge was quite limited and primarily anecdotal. This made it difficult to create, test and deploy integrated security solutions, for better and efficient Network Security. Various exploits and their detrimental effects have been explored, their respective signatures are captured, analyzed and reported in this thesis work. Many open source Honeypots have also been analyzed by configuring them at the workplace. Comparison of features, their respective levels of interactions and risk factors associated with deployment have been focused. Finally, A Proactive Network Surveillance Framework is proposed. The framework consists of five layers, addressing security at various levels, following the onion model of defense in which defense consists of many layers. First layer of the framework: Core Security addresses the physical security issues. This layer also recommends changes at filesystem level to enhance security of the installed framework. | |
dc.format.extent | 192p. | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Proactive Network Surveillance Framework | |
dc.title.alternative | ||
dc.creator.researcher | Singh, Maninder | |
dc.subject.keyword | Network Security | |
dc.subject.keyword | Proactive Security | |
dc.subject.keyword | Reactive Security | |
dc.description.note | ||
dc.contributor.guide | Bawa, Seema and Saxena, S.C. | |
dc.publisher.place | Patiala | |
dc.publisher.university | Thapar Institute of Engineering and Technology | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | ||
dc.date.completed | 2007 | |
dc.date.awarded | ||
dc.format.dimensions | ||
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 42.49 kB | Adobe PDF | View/Open |
02_dedication.pdf | 63.29 kB | Adobe PDF | View/Open | |
03_contents.pdf | 46.05 kB | Adobe PDF | View/Open | |
04_list of figures.pdf | 46.24 kB | Adobe PDF | View/Open | |
05_list of tables.pdf | 42.43 kB | Adobe PDF | View/Open | |
06_certificate.pdf | 44.04 kB | Adobe PDF | View/Open | |
07_acknowledgement.pdf | 44.82 kB | Adobe PDF | View/Open | |
08_abstract.pdf | 67.76 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 156.71 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 1.08 MB | Adobe PDF | View/Open | |
11_chapter3.pdf | 448.17 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 287.44 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 415.92 kB | Adobe PDF | View/Open | |
14_chapter6.pdf | 3.3 MB | Adobe PDF | View/Open | |
15_chapter7.pdf | 71.57 kB | Adobe PDF | View/Open | |
16_refrences.pdf | 84.37 kB | Adobe PDF | View/Open | |
17_list of publications.pdf | 63.83 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 109.87 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: