Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/4117
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2012-05-17T06:00:49Z-
dc.date.available2012-05-17T06:00:49Z-
dc.date.issued2012-05-17-
dc.identifier.urihttp://hdl.handle.net/10603/4117-
dc.description.abstractThe security in computer networks is a rapidly growing area of concern. Most of the valuable information resides on the networks, making the network an inevitable entity for survival. All these small networks are connected further to wide area networks which in turn forms the basis of Internet. The Internet is the „world‟s largest collection of networks that reaches universities, government labs, commercial enterprises, and military installations in many countries”. Internet consists primarily of local area networks. The principle method of communication on the Internet is the TCP/IP protocol suite. The Internet, however, is increasingly becoming an environment with multiple protocols. The Internet was an experiment begun in 1968 by the Defense Departments Information Processing Techniques Office to connect computers over a network in order to ensure command and control communications in the event of a nuclear war. The original network was known as the ARPAnet, and the project quickly became a „straight research project without a specific application‟. In the 1980s, the number of local area networks increased significantly and this stimulated rapid growth of interconnections to the ARPAnet and other networks. These networks and interconnections are known today as the Internet. Keeping all this in consideration, it is proposed to design and develop a proactive network surveillance framework. This Framework aims to provide learning vision to the network attacks. The main objective of this research is to bring improved network security through: --Exploring and analyzing various exploit and their detrimental effects on network security, --exploring various honeypots and analyze their working, --development of a proactive network surveillance framework, --creating a bootable enhanced Linux distribution with security scripts and tools (built during this work) to analyze and enhance security, --deployment and testing of the framework,--Learning and monitoring network in real time.en_US
dc.languageEnglishen_US
dc.rightsuniversityen_US
dc.titleA critical study of counteract attempts at unauthorized use of information systemsen_US
dc.creator.researcherYadav, Kusumen_US
dc.subject.keywordInformation Systemsen_US
dc.subject.keywordNetwork Securityen_US
dc.subject.keywordOSI Modelen_US
dc.subject.keywordProactive Securityen_US
dc.description.noteReferences included, Conclusion includeden_US
dc.contributor.guideRakesh Kumaren_US
dc.publisher.placeJhunjhunuen_US
dc.publisher.universityShri Jagdishprasad Jhabarmal Tibarewala Universityen_US
dc.publisher.institutionDepartment of Computer Science and Engineeringen_US
dc.date.registered2009en_US
dc.date.completed2012en_US
dc.date.awarded2012en_US
dc.format.accompanyingmaterialNoneen_US
dc.source.universityUniversityen_US
dc.type.degreePh.D.en_US
Appears in Departments:Faculty of Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File31.6 kBAdobe PDFView/Open
02_certificates.pdf120.05 kBAdobe PDFView/Open
03_acknowledgement.pdf82.5 kBAdobe PDFView/Open
04_list of figures.pdf144.76 kBAdobe PDFView/Open
05_list of tables.pdf82.5 kBAdobe PDFView/Open
06_contents.pdf24.37 kBAdobe PDFView/Open
07_abstract.pdf141.3 kBAdobe PDFView/Open
08_chapter 1.pdf607.72 kBAdobe PDFView/Open
09_chapter 2.pdf913.23 kBAdobe PDFView/Open
10_chapter 3.pdf386.26 kBAdobe PDFView/Open
11_chapter 4.pdf1.23 MBAdobe PDFView/Open
12_chapter 5.pdf861.04 kBAdobe PDFView/Open
13_chapter 6.pdf854.5 kBAdobe PDFView/Open
14_chapter 7.pdf2.44 MBAdobe PDFView/Open
15_conclusions.pdf316.42 kBAdobe PDFView/Open
16_references.pdf274.84 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: