DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1652
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 1.1K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT
This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks--attacks that use ambiguities to subvert detection--on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host's operating system.


TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS 

CHAPTER ONE
INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 AIMS AND OBJECTIVE
1.3 PURPOSE OF STUDY
1.4 AIMS AND OBJECTIVES OF STUDY
1.5 SCOPE OF THE STUDY
1.6 LIMITATION OF THE STUDY
1.7 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSION OF THE SUBJECT MATTER

CHAPTER FOUR
THE FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER FOR THE SOCIETY

CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1652
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 1.1K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1652
    Fee ₦5,000 ($14)
    No of Pages 59 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network... Continue Reading
    ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    ABSTRACT This dissertation mainly looked into all aspects of VoIP communications technology and information presented in preceding chapters, which build up a super frame work to discuss the conceptual design model and investigate features that could be incorporated for actual projects, with parameters that are tested on field values, the... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the different machines used in information processing system to reduce the... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System†is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also... Continue Reading
    ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of... Continue Reading
    Call Us
    whatsappWhatsApp Us