Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/4117
Title: | A critical study of counteract attempts at unauthorized use of information systems |
Researcher: | Yadav, Kusum |
Guide(s): | Rakesh Kumar |
Keywords: | Information Systems Network Security OSI Model Proactive Security |
Upload Date: | 17-May-2012 |
University: | Shri Jagdishprasad Jhabarmal Tibarewala University |
Completed Date: | 2012 |
Abstract: | The security in computer networks is a rapidly growing area of concern. Most of the valuable information resides on the networks, making the network an inevitable entity for survival. All these small networks are connected further to wide area networks which in turn forms the basis of Internet. The Internet is the „world‟s largest collection of networks that reaches universities, government labs, commercial enterprises, and military installations in many countries”. Internet consists primarily of local area networks. The principle method of communication on the Internet is the TCP/IP protocol suite. The Internet, however, is increasingly becoming an environment with multiple protocols. The Internet was an experiment begun in 1968 by the Defense Departments Information Processing Techniques Office to connect computers over a network in order to ensure command and control communications in the event of a nuclear war. The original network was known as the ARPAnet, and the project quickly became a „straight research project without a specific application‟. In the 1980s, the number of local area networks increased significantly and this stimulated rapid growth of interconnections to the ARPAnet and other networks. These networks and interconnections are known today as the Internet. Keeping all this in consideration, it is proposed to design and develop a proactive network surveillance framework. This Framework aims to provide learning vision to the network attacks. The main objective of this research is to bring improved network security through: --Exploring and analyzing various exploit and their detrimental effects on network security, --exploring various honeypots and analyze their working, --development of a proactive network surveillance framework, --creating a bootable enhanced Linux distribution with security scripts and tools (built during this work) to analyze and enhance security, --deployment and testing of the framework,--Learning and monitoring network in real time. |
URI: | http://hdl.handle.net/10603/4117 |
Appears in Departments: | Faculty of Computer Science & Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 31.6 kB | Adobe PDF | View/Open |
02_certificates.pdf | 120.05 kB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 82.5 kB | Adobe PDF | View/Open | |
04_list of figures.pdf | 144.76 kB | Adobe PDF | View/Open | |
05_list of tables.pdf | 82.5 kB | Adobe PDF | View/Open | |
06_contents.pdf | 24.37 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 141.3 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 607.72 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 913.23 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 386.26 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 1.23 MB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 861.04 kB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 854.5 kB | Adobe PDF | View/Open | |
14_chapter 7.pdf | 2.44 MB | Adobe PDF | View/Open | |
15_conclusions.pdf | 316.42 kB | Adobe PDF | View/Open | |
16_references.pdf | 274.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: