network security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Divya konaka
Active In SP
**

Posts: 2
Joined: Jan 2011
#1
20-01-2011, 05:28 PM


can we do any working models in network security?
can you please suggest some topics??
Reply
summer project pal
Active In SP
**

Posts: 308
Joined: Jan 2011
#2
01-02-2011, 12:09 PM

A Model of Network Security with Prevention Capability by Using Decoy Technique
a model of network security systems which aims at preventing the attack at the production system in a data center is described. a decoy system is introduced as a part of the strategy to lure the intrusions and a network intrusion detection is applied to it to prevent the intrusion. Whenever an an activity of intrusion is detected by the NIDS, a redirection module is signaled to redirect all the malicious traffics to attack the decoy system instead. Thus the production system is safe from the attack of the intruder. traffic will be simply forwarded to the production system in the normal circumstances. the performance of the model is assessed with the sue of various bandwidths, packet sizes, inter-attack intervals etc.

Get the report here:
wasetjournals/waset/v29/v29-34.pdf

more info about the network security can be had form here:
topicideashow-to-network-security-full-report--10704?page=2
topicideashow-to-network-security-seminar and presentation-report
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Request for project ideas on Social Security and Social Welfare Data Mining Guest 1 83 11-03-2016, 02:28 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol Guest 1 999 28-02-2014, 01:40 AM
Last Post: mspadmini19
  Improving security and efficiency in attribute based data sharing Guest 3 1,681 10-01-2014, 12:49 PM
Last Post: seminar project topic
  iSCSI-Future of Network Storage amity117 0 402 07-10-2013, 02:17 PM
Last Post: amity117
  segmentation of dermoscopic images using wavelet network Guest 0 355 15-09-2013, 10:08 PM
Last Post: Guest
  segmentation of dermoscopic images using wavelet network Guest 0 315 15-09-2013, 10:07 PM
Last Post: Guest
  project and implimentation on hacking and security Guest 1 391 02-09-2013, 09:40 AM
Last Post: study tips
  designing and implementation of pyroeelectric infrared sensor based security system Guest 0 310 29-08-2013, 12:41 PM
Last Post: Guest
  it security honey pot Guest 0 256 23-08-2013, 04:11 PM
Last Post: Guest
  multiple routing configurations for fast IP network recovery aswathyspillai11 2 1,067 20-08-2013, 01:12 PM
Last Post: study tips