Protocol Scrubbing: Network Security Through Transparent Flow Modification
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
17-09-2009, 10:18 PM


Protocol Scrubbing: Network Security Through Transparent Flow Modification
Abstract: This paper describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker™s ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks”attacks that use ambiguities to subvert detection”on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host™s operating system.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DOOR LOCKING SECURITY SYSTEM UING GSM FULL REPORT seminar class 11 10,802 14-06-2014, 08:07 PM
Last Post: lagua2012
  Air flow detector circuit report project girl 1 1,627 07-01-2014, 09:28 PM
Last Post: ashitha sebastian
  PC to PC Wireless Communication through RF Link project topics 10 9,715 18-10-2013, 10:24 PM
Last Post: Guest
  FINGERPRINT BASED ATM SECURITY ABSTRACT seminar projects maker 0 535 26-09-2013, 04:56 PM
Last Post: seminar projects maker
  The pothole patrol: using a mobile sensor network for road seminar projects maker 0 526 26-09-2013, 03:56 PM
Last Post: seminar projects maker
  Virtual River Monitoring System for Bangladesh using Wireless Sensor Network Report seminar projects maker 0 480 20-09-2013, 04:45 PM
Last Post: seminar projects maker
  DEVELOPMENT OF COAL MINE SAFETY SYSTEM USING WIRELESS SENSOR NETWORK REPORT seminar projects maker 0 599 14-09-2013, 03:53 PM
Last Post: seminar projects maker
  NON-PAYMENT VEHICLE SEARCHING METHOD FOR MULTILANE-FREE-FLOW ELECTRONIC-TOLL REPORT study tips 0 335 09-09-2013, 03:10 PM
Last Post: study tips
  REPORT ON ADVANCED VEHICLE SECURITY SYSTEM study tips 0 1,234 06-09-2013, 04:57 PM
Last Post: study tips
  wireless energy transmitter with tariff system through microcontroller seminar class 5 2,914 27-08-2013, 10:07 AM
Last Post: study tips