Free Essay

Bluetooth Network Security

In:

Submitted By bazith
Words 2516
Pages 11
VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY

A seminar report on

GENETIC ALGORITHMS
Submitted by Pranesh S S 2SD06CS061 8th semester

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING 2009-10

1

VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

CERTIFICATE
Certified that the seminar work entitled “GENETIC ALGORITHMS” is a bona fide work presented by Pranesh S S bearing USN NO 2SD06CS061 in a partial fulfilment for the award of degree of Bachelor of Engineering in Computer Science Engineering of the Vishveshwaraiah Technological University, Belgaum during the year 2009-10. The seminar report has been approved as it satisfies the academic requirements with respect to seminar work presented for the Bachelor of Engineering Degree.

Staff in charge SANTOSH DESHPANDE SIR Name: Pranesh S S USN: 2SD06CS061

H.O.D

2

INDEX
1. INTRODUCTION 2. HISTORY 3. DEFINITION AND EXPLANATION 4. NEED FOR GENETIC ALGORITHM 5. IMPORTANCE OF GAOVER OTHER TECHNIQUES? 6. WORKING OF GA 6.1 BASIC DESCRIPTION 6.2 GENERAL ALGORITHM 7. IMPLEMENTATION 8. EXAMPLE-A SIMULATION BY HAND 9. ADVANTAGES AND DISADVANTAGES 10. CONCLUSION 11. REFERENCES 4 4 5 5 6 6 7 7 8 11 12 13 13

3

Abstract
Genetic Algorithms have recently become a popular artificial technique for solving complex optimization problems and a sophisticated tool for machine learning. This paper provides an introduction to genetic algorithms and brief applicability to problems. There is a focus on GAs used as a optimisation technique. GAs technique is based on natural evolution where provides a robust solution for a given problem. This paper explains how GAs approaches to optimization for a problem with implementation methods.

1. Introduction
Nature provides us different things. When we try to think about nature, there are complex mechanisms, operations involved in it. There are many scientific theories proposed on specific part of nature. One among the successful theory is DARWIN’S theory of EVOLUTION. The most important is that it predicted the need for a biological way for passing information between generations. That ultimately led to the discovery of the DNA molecule and within half a century the mapping of the human genome as well as that of other animals. In the other direction the ideas of evolution have given computer scientists ideas for new ways to program - the notion of genetic algorithms. Computer science is about coming up with solutions to problems and that is exactly what nature does over time - adapt animal species via natural selection to allow them to survive better in their changing environments. The idea is that to solve a problem into "digital DNA" and evolve a solution.

2. History
It was in the 1950/60s that several independent researchers were studying the idea that evolution could be used as an optimization tool for engineering problems. The idea behind it all was to evolve solutions to problems by using natural means based on “survival of the fittest”. Evolutionary strategies were introduced in the mid 60s by Rechenberg as a method he used to optimize real-valued parameters for hardware devices. Owens, Fogel and Walsh developed evolutionary programming, a technique used where candidate solutions to problems or tasks were represented as finite-state machines which were evolved by randomly mutating their state-transition diagrams and then selecting the fittest. Together with genetic algorithms, these three areas form the backbone of evolutionary computation. Genetic algorithms were invented by Holland in the 60's and developed later in the 70's. This method was defined as a way to move from one population of chromosomes to another by utilizing natural selection and the operator of crossover, mutation, and inversion. In recent years, there was been widespread interaction among researchers from varied evolution-based studies and as a result, we find some breakdown in the boundaries that define and separate the fields of genetic algorithms, evolution strategies, and evolutionary programming. Often, the term - genetic algorithm - is used to describe something very different from what was originally defined.
4

3. Definition of “GENETIC ALGORITHMS”
“Genetic Algorithms are nondeterministic stochastic search/optimization methods that utilize the theories of evolution and natural selection to solve a problem within a complex solution space”.
Genetic algorithms are basically computer-based problem solving systems which use computational models of some of the known mechanisms in “evolution” as key elements in their design and implementation. They are a member of a wider population of algorithm Evolutionary Algorithms (EA). The major classes of EAs are: GENETIC ALGORITHMs, EVOLUTIONARY PROGRAMMING, EVOLUTION STRATEGIEs, CLASSIFIER SYSTEM, and GENETIC PROGRAMMING. They all share a common conceptual base of simulating the evolution of individual structures through methods of selection, mutation, and reproduction. The methodologies depend on the performance of the individual structures as defined by an environment. Genetic Algorithms are heuristic, which means it estimates a solution. We won't know if we get the exact solution, but that may be a minor concern. In fact, most real-life problems are like that: we estimate a solution rather than calculating it exactly. GA’s work within a Complex solution space: GAs can be used where optimization is needed. I mean that where there are complex large solutions to the problem but we have to find the best one. Like we can use GAs in finding best moves in chess, mathematical problems, financial problems and in many more areas.

4. Need for Genetic algorithm
There are many tasks for which we know fast (polynomial) algorithms. There are also some problems that are not possible to be solved algorithmically. For some problems was proved that they are not solvable in polynomial time. But there are many important tasks, for which it is very difficult to find a solution, but once we have it, it is easy to check the solution. This fact led to NP-complete problems [1]. NP stands for nondeterministic polynomial and it means that it is possible to "guess" the solution (by some nondeterministic algorithm) and then check it, both in polynomial time. If we had a machine that can guess, we would be able to find a solution in some reasonable time. Studying of NP-complete problems is for simplicity restricted to the problems, where the answer can be yes or no. Because there are tasks with complicated outputs, a class of problems called NP-hard problems has been introduced. This class is not as limited as class of NP-complete problems

5

For NP-problems is characteristic that some simple algorithm to find a solution is obvious at a first sight - just trying all possible solutions. But this algorithm is very slow (usually O(2^n)) and even for a bit bigger instances of the problems it is not usable at all. Today nobody knows if some faster exact algorithm exists. Proving or disproving this remains as a big task for new researchers. Today many people think, that such an algorithm does not exist and so they are looking for some alternative methods - example of these methods are “GENETIC ALGORITHMS”. Our approach of genetic algorithm (GA) is an optimization strategy inspired by the Darwinian evolution process. Starting with a population of candidate structures, we relax these candidates to the nearest local minimum. Using the criteria of fitness, a fraction of the population is selected to produce a finally an optimum solution.

5. Importance of GA over other techniques
For most problems in real life don't have any formula for solving the problem because it is too complex, or if you do, it just takes too long to calculate the solution exactly. An example could be space optimization - it is very difficult to find the best way to put objects of varying size into a room so they take as little space as possible. The most feasible approach then is to use a heuristic method [2]. Genetic algorithms are different from other heuristic methods in several ways. The most important difference is that a GA works on a population of possible solutions, while other heuristic methods use a single solution in their iterations. Another difference is that GAs are probabilistic (stochastic), not deterministic.

6. Working of GA
Before understanding the working of GA, let’s understand some biological terms related to this. Chromosome: A set of genes. Chromosome contains the solution in form of genes [3]. Gene: A part of chromosome. A gene contains a part of solution. It determines the solution. E.g.16743 is a chromosome and 1,6,7,4 and 3 are its genes. Individual: Same as chromosome. Population: No of individuals present with same length of chromosome. Fitness: Fitness is the value assigned to an individual. It is based on how far or close a individual is from the solution. Greater the fitness value better the solution it contains. Fitness function: Fitness function is a function which assigns fitness value to the individual. It is problem specific. Breeding: Taking two fit individuals and intermingling the chromosome to create new two individuals. Mutation: Changing a random gene in an individual. Selection: Selecting individuals for creating the next generation.

6

6.1 Basic description
Genetic algorithm applies the rules of evolution to the individuals. Each individual in the GA population represents a possible solution to the problem. It selects the fit individuals according to fitness function then combines these individuals into new individuals. Using this method repeatedly, the population will hopefully evolve good solutions. Specifically, the elements of a GA are: [4] 1.selection (according to some measure of fitness), 2.cross-over (a method of reproduction, "mating" the individuals into new individuals), and 3.mutation (adding a bit of random noise to the off-spring, changing their "genes"). As we can see here, Darwin's principles have been a major inspiration to GAs. It can be performed through following cycle of stages. i) Creation of a "population" of strings ii) Evaluation of each string iii) Selection of best strings and iv) Genetic manipulation to create new population of strings. This flowchart illustrates the basic steps in a GA:

7

6.2 General Algorithm of GA
The algorithm is almost same in most of the applications only fitness functions are different to different problems. The general algorithm is as follows [3]: START Generate initial population. Assign fitness function to all individuals.[Fitness] DO UNTIL best solution is found Select individuals from current generation [Elitism] Create new offspring with mutation and/or breeding [New Population] Compute new fitness for all individuals Kill all the unfit individuals to give space to new offsprings[Replace] Check if best solution is found LOOP END

7. Implementation
Now let’s concentrate on how all the steps are done: Each cycle in Genetic Algorithms produces a new generation of possible solutions for a given problem. In the first phase, an initial population, describing representatives of the potential solution, is created to initiate the process. 1. The elements of the population are encoded into bit-strings, called chromosomes. Although encoding of chromosomes is done by many ways, binary encoding is most used. In binary encoding every chromosome is a string of bits, 0 or 1. Chromosome A 101100101100101011100101 Chromosome B 111111100000110000011111 2. The performance of the strings, often called fitness, is then evaluated with the help of some functions, representing the constraints of the problem. A fitness function is a particular type of objective function that prescribes the optimality of a solution (that is, a chromosome) in a genetic algorithm so that that particular chromosome may be ranked against all the other chromosomes. Depending on the fitness of the chromosomes, they are selected for a subsequent genetic manipulation process. 3. Selection process is mainly responsible for assuring survival of the best-fit individuals. Here individual genomes are chosen from a population for later breeding (recombination or crossover).

8

A generic selection procedure may be implemented as follows:


The fitness function is evaluated for each individual, providing fitness values, which are then normalized. Normalization means dividing the fitness value of each individual by the sum of all fitness values, so that the sum of all resulting fitness values equals 1.This can be done and represented through “Roulette wheel selection method”. Roulette wheel selection method: Imagine a roulette wheel where all chromosomes are placed in the population, every chromosome has its place big accordingly to its fitness function, it’s looks like on the following picture [2].

• •

• •

The population is sorted by descending fitness values. Accumulated normalized fitness values are computed (the accumulated fitness value of an individual is the sum of its own fitness value plus the fitness values of all the previous individuals). The accumulated fitness of the last individual should of course be 1 (otherwise something went wrong in the normalization step!). A random number R between 0 and 1 is chosen. The selected individual is the first one whose accumulated normalized value is greater than R .This step is repeated until chromosome is found. The selected chromosomes (individuals) are called parents.

4.

After selection of the population strings is over, the genetic manipulation process consisting of two steps is carried out. In the first step, the crossover operation that recombines the bits (genes) of each two selected strings (chromosomes) is executed. The second step in the genetic manipulation process is termed mutation, where the bits at one or more randomly selected positions of the chromosomes are altered. CROSS-OVER The cross-over is the method for combining those selected individuals into new individuals. Remember that the individuals are simply strings of values. The crossover splits up the "parent" individuals and recombines them. Here's an example of how two "parents" cross over to make two "children". The simplest way how to do this is to choose randomly some crossover point and everything before this point copy from a first parent and then everything after a crossover point copy from the second parent.

9

Chromosome 1 11011 | 00100110110 Chromosome 2 . It is illustrated in figure below 11011 | 11000011110

11011 | 11000011110 11011 | 00100110110

child1 child2

MUTATION Mutation is used to maintain genetic diversity from one generation of a population of chromosomes to the next. It is analogous to biological mutation. The classic example of a mutation operator involves a probability that an arbitrary bit in a genetic sequence will be changed from its original state. A common method of implementing the mutation operator involves generating a random variable for each bit in a sequence. This random variable tells whether or not a particular bit will be modified. The purpose of mutation in GAs is preserving and introducing diversity. Mutation should allow the algorithm to avoid local minima by preventing the population of chromosomes from becoming too similar to each other, thus slowing or even stopping evolution. This reasoning also explains the fact that most GA systems avoid only taking the fitness of the population in generating the next but rather a random (or semi-random) selection with a weighting toward those that are fitter. Mutation is illustrated in below figure.

Alteration of 5th bit.
10

8. Example: a simulation by hand
[5]The Genetic Algorithms cycle is illustrated in this example for maximizing a function f(x) = x2 in the interval 0 < x

Similar Documents

Premium Essay

Fundamental of Network

...Fundamentals of Networks Alhaji Mansary University of Phoenix Integrative Network Design Project Part 3 Prof, Marjorie Marque 12/12/12. Kudler Fine Foods Network: Final Introduction Kudler Fine Foods is on their way to upgrading their present network infrastructure with better wireless technology that will provide an improved communication medium both for the stores and employees. This will help maximizing the company’s profits with the aid of the new systems and servers performance. The new inventory system will let a store’s POS system to alert the warehouses that they need to ship more products already when the store is running low in stock. This will eliminate or at least make the man-hours needed in checking the stock. VoWLAN (Voice over WLAN) is the one to provide all the communications needed to be done by taking or making calls while providing the services needed by the customers by using the same medium. Other technological Advances will provide real-time network analysis and security monitoring which will bring overall benefits to the Kudler Company. Network Overview Kudler’s network infrastructure is now becoming very old. The stores are on separate networks so the bus network topology that they have does not allow effective communication already. This is a major problem because of the fact of lacking central location for network servers and backups or security set-up. This is the reason an enterprise wireless WAN is being rolled...

Words: 3022 - Pages: 13

Premium Essay

Information and Technology

...marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information safe, as they are trusted by each customer. CPO must also keep the information held within the facility and network safe, belonging to their employees. The Human Resource Team and Management...

Words: 1127 - Pages: 5

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14

Premium Essay

Solutions of This Questions

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Premium Essay

How to Plan for Security

...for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The network administrators...

Words: 1907 - Pages: 8

Free Essay

Orascom Case Study

...international telecommunications market. OTH is considered among the largest and most diversified network operators in the Middle East, Africa and Asia, with a mobile telephony penetration of approximately 48% in those regions, and more than 80 million subscribers as of March 31st, 2009. Orascom Telecom Holding operates GSM networks in Algeria (OTA), Egypt (Mobinil), Pakistan (Mobilink), Bangladesh (Banglalink), Tunisia (Tunisiana) and North Korea (Koryolink). OTH has an indirect equity ownership in Globalive Wireless which has been granted a spectrum license in Canada. Through its subsidiary Telecel Globe, OTH also operates in Burundi, the Central African Republic, Namibia and Zimbabwe. At OTH, all the information exchanged between the corporate headquarters and OTH subsidiaries on one side, and external vendors on the other side, is communicated by email. Email is therefore a mission-critical business application on which all corporate employees rely. Unfortunately, with 90% of its 1.5 million daily emails consisting of spam, OTH was rapidly overwhelmed by this type of malware. In order to protect its corporate email servers and users against spam and viruses, the IT security department of OTH had installed a third-party software application on the exchange servers. However, this security solution soon turned out to be ineffective both in terms of robustness and accuracy. Mina Samir, IT security manager at OTH recalls: “Spam was seriously affecting our business. Many relevant emails...

Words: 971 - Pages: 4

Premium Essay

Cmgt

...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...

Words: 1199 - Pages: 5

Free Essay

Security Solutions

...Security Solutions Jonathan E. La Rosa July 22, 2014 NTC/411 Randal C. Shirley Security Solutions Firewalls have been around for years. In that time, they have protected various different organizations and corporations from possible hacker attacks. They play a critical part in protecting the internal network and making sure that packets are screened and checked before being provided access. Although firewalls are extremely powerful, especially in today’s world, they cannot be the only source of protection that the network can have. Various other technologies need to be used in order to actually make sure that the data is secure and that information has not be tampered with. Intrusion Prevention Systems, or IPS’, as well as Intrusion Detection Systems, or IDS’ are great in making sure that the network is free of any attacker or unwanted individual. These different technologies working together can provide the best protection possible, although they do have to be monitored in order to make sure they are working in the best way possible. Firewall Protection Managing firewalls is a fundamental function in making sure a network is secure. Network security managers are the main individuals who have to make sure that the firewall is constantly working in the most effective and efficient way possible. The rules that are in place within this device can and will affect the network and how it responds. Firewalls need to be constantly upgraded and put with the latest...

Words: 948 - Pages: 4

Free Essay

It 101 Gmu

...* Question 1 1 out of 1 points | | | Which of the following was the first highly publicized network security problem?Answer | | | | | Selected Answer: |   b. Morris Worm | Correct Answer: |   b. Morris Worm | | | | | * Question 2 1 out of 1 points | | | What is the functionality of CERT?Answer | | | | | Selected Answer: |   e. All of the above | Correct Answer: |   e. All of the above | | | | | * Question 3 1 out of 1 points | | | Bandwidth piracy is considered as a type of attackAnswer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | | * Question 4 1 out of 1 points | | | A worm is malicious code embedded within a seemingly legitimate program that only becomes active when the program is executed.Answer | | | | | Selected Answer: |  False | Correct Answer: |  False | | | | | * Question 5 1 out of 1 points | | | Which of the following is self-propagating and self-replicating?Answer | | | | | Selected Answer: |   b. Worm | Correct Answer: |   b. Worm | | | | | * Question 6 1 out of 1 points | | | A worm exploits existing vulnerabilities, or security holes in a computer systemAnswer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | | * Question 7 1 out of 1 points | | | A denial of service attack floods a targeted computer with so many requests that it cripples functionality.Answer...

Words: 669 - Pages: 3

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Management

...Case Application Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. “That’s the reality of their daily work life. At the company’s response lab in Santa Monica, California, described as the “dirtiest of all our networks at Symantec. “ Software analysts collect viruses and other suspicious cod and try to figure out how they work so the company can provide security updates to its customers. There’s even a hazardous materials box by the door to the lab, marked DANGER, where they put all the discs, tapes, and hard drives with the nasty viruses that need to be completely disposed of. Symantec’s situations may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects the realities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well. Vincent Weafer, a native of Ireland, has been the leader of Symantec’s virus hunting team since 1999. Back then, he said “there were less than two dozen people, and . . . nothing really happened. We’d see may be five new viruses a day, and they would spread in a matter of months, not minutes. “Now, Symantec’s virus hunter around the words...

Words: 1368 - Pages: 6

Premium Essay

Week 6 Case Study

...Johnson SEC280 Instructor: R. Booth Week 6 Case study Here at gem security, it is important for our network and its resources to be kept secure from possible intrusion from outside sources. Installing of an IDS policy is an important thing in keeping the network safe. Installing a Network IDS (NIDS) onto a network requires a significant amount of thought and planning. In addition to the technical issues and product selection there are resource issues, from product cost to manning the sensor feeds and supporting the infrastructure that must also be considered. When installing an IDS a policy needs to be developed to ensure responsibilities are clearly defined. This is especially important when delivering an IDS capability remotely or to another organization's network. On the subject of failing hardware, people administering the target network must be made fully aware that if network taps are used, even fail safe taps can take up to a second for the interfaces to re-negotiate and could potentially disrupt services, though recent improvements have reduced this latency considerably. If the network is remote then it is advisable for the policy to reflect that the target network manpower can be called upon for a predefined duration for power resets, etc. Attempting this retrospectively through contractual alteration, if required, can be expensive and time consuming. If you rely on the distant network for support, ensure you have a telephone authentication system in place...

Words: 537 - Pages: 3

Premium Essay

Final

...Increasing Security in Bank Network Security to Prevent Information Leaks There are three main pillars of bank network security including firewalls, intrusion detection and intrusion prevention. Additional network security and added firewall protection will help banks keep information safe and confidential. An overkill of security, having mass protection from viruses, and doubling up on firewalls will aid in this effort. Taking measures to extremes to ensure the best protection from any type of malware or virus threat, and keeping information secure where it’s meant to be is a huge concern of banks. Ensuring the protection of client’s information assists with the bank staying in business and keep customers coming. Clients need the knowledge that their information and money is protected and not accessible to any outside intrusion. If a client is aware of the extreme measures of protection taken on their delicate information, they will feel more comfortable in using a banking system. A well protected bank network, with top of the line security monitoring is a much safer pick to cliental, and network security in banking is just as important as general security over the bank! An alarm system, cameras, and locking the building and safes holding moneys, pose the same type of protection of individual moneys in being transferred in some way. Network security is slightly more demanding than general security however, because an intruder in a bank’s network has access to...

Words: 1441 - Pages: 6

Free Essay

Chapter 7 Assessment Answers

...) is a Default-Deny rule. 3.) The Default-Deny rule appears last in the rule set. 4.) C.) is the Mechanism that allows a firewall to hand off authentication to a dedicated service host on a different system. 5.) E.) All events should be included in the file log. 6.) Stopping intrusions is not an activity used in firewall logging. 7.) An internal user accessing a public web site is not in a firewall log warrant investigation by an administrator. 8.) Centralized logging is a highly recommended method or technique for keeping firewall logs secure and uncorrupted. 9.) Packets from an unassigned internal address is an event found in a firewall log file that is a symptom of a rogue host operating within the private network. 10.) False negatives is the biggest issue or problem with an IDS. 11.) Using first match apply rule systems is not a limitation of a firewall. 12.) Wirespeed is when a firewall is able to process packets, filter malicious code, transit authorized communications onward to their destination without introducing latency or lag. 13.) Native antivirus scanning is not related to improving or maintaining the performance of a firewall. 14.) Transport mode is a form of encryption allows a firewall to filter based on the original source and destination address. 15.) The Web can be improved using caching on a firewall. 16.) Denial of service due to traffic from external sources cannot be fixed or corrected with the application...

Words: 364 - Pages: 2

Free Essay

Ddos-Lot2-Task1

...DDoS Attack Mitigation Username Online College Distributed Denial of Service (DDoS) attacks have been causing internet disruption for years. The types and frequency has evolved over time (The Growing Threat, 2012). Originally, multiple machines would ping a machine and take up its resources. Then attackers started to use the TCP handshake as an attack medium. They would request so many connections, that there would be none left for legitimate users. Now, the DDoS attacks are hitting at the application level. A DDoS attack at the application layer is very difficult to detect. The attack consumes less bandwidth than other DDoS attacks and the attack targets very specific protocols. Some protocols that they attack are HTTP, used for connecting to web pages, DNS, used for turning a web address to an IP address, and SMTP, used for email transfer (The Growing Threat, 2012). Since they use well known and frequently used protocols to exploit, these attacks easily bypass normal traffic inspectors. The protocols for web must be open on the firewall and IDS because if they weren’t, normal web traffic would not go through. This would make the internet useless for everyone. In order to mitigate this issue and still have connectivity, there are two things the University can do. First, the IT staff can deploy a Host-based Intrusion Prevention System (HIPS). This will be deployed to all of the University computers and centrally managed by a server in the data center. It...

Words: 727 - Pages: 3