...thank the members of the teaching and non-teaching staff of Fr.CRCE for the timely help extended by them. Lastly thanking our parents, for their morale support and encouragement. Kunal Gopal Thakur Vishal Shirguppi Justin Francis Shazia Ali ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or hardware that monitors all network traffic. The security threat presented by sniffers is their ability to capture all incoming and outgoing traffic, including clear-text passwords and usernames or other sensitive material. While packet sniffers can be fully passive, some aren’t, therefore they can be detected. This paper discusses the different methods that Anti-Sniff uses to detect these...
Words: 3356 - Pages: 14
...Lovely professional university term paper topic-system engineerring roles in software enginerring cap 590 rollno.46 section-1101 reg no-11001009 submitted to-pawan sir submitted by-jaspreet singh TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one...
Words: 2390 - Pages: 10
...of extensiveness, simplicity and generality we can collect the information of person computer and router in order to help us to analyses the situation of the network. This article first has made the analysis of technology development of our own country and all over the world. Then we proposed the detection technology of situational awareness of network when we combining with project background. Finally we come up with the idea of a method to do the detection based on the SNMP. The information we need to collect mainly in the SNMP’s MIB database .It includes interface group, IP group and ICMP group. After we collect the information we need we can begin the analysis work. We use data mining technique to do the data analysis. Finally our aim is that we can get the current network state. After the method is raised we will construct the test platform then realize the thesis. At the end of the paper I will summarizes the work and put forward the further...
Words: 296 - Pages: 2
...226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson Abstract--This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed," source addresses. In this paper, we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post mortem"--after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology. Index Terms--Computer network management, computer network security, network servers, stochastic approximation, wide-area networks. I. INTRODUCTION D ENIAL-OF-SERVICE attacks consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Such attacks are among the hardest security problems to address because they are simple to implement, difficult to prevent, and very difficult...
Words: 11860 - Pages: 48
...Danielle J Adams 000296145 QBT1 Language & Communication 14 May 2003 References Hickey, A. (2010). Cloud Computing. The Year of the Cloud...For Real This Time. Para 3. Retrieved from http://www.crn.com/slide-shows/cloud/232301107/10-cloud-predictions-for-2012.htm This reference offers information on the direction that Cloud Computing has taken and is taking in 2012. Hickey, offers the reader a perspective into prediction based on his account of current corporations and organizations direction into the significance of this service. Tadjer, R. (2010). Cloud Computing. What is Cloud Computing? Para 2 – 3. Retrieved from www.pcmag.com/article2/0,2817,2372163,00.asp This reference offers the reader understanding into how cloud computing is used in capitalism and the effects on the average consumer. This reference also offers understanding into privacy factors that come into play with cloud computing. Evans, B. (2013). Oracle Software Chief Thomas Kurian: 10 Strategic Cloud Computing Insights. Retrieved from http://www.forbes.com/sites/oracle/2013/05/08/oracle-software-chief-thomas-kurian-10-strategic-cloud-computing-insights/ This reference offers information regarding important issues expressed by customers of Oracle and the challenges faced when using this cloud computing software. This article gives insight to some of the implemented changes made by Executive V.P. of Product Development for Oracle software Thomas Kurian. Kurian discusses some...
Words: 728 - Pages: 3
...Estonia Banks Targeted University of Maryland University College CSEC 620 Individual assignment # 2 Table of Contents Introduction …………………………………………………………………………………………………………. 3 Estonia under attack……………………………………………………………………………………………….. 4 Types of attacks ……………………………………………………………………………………………………… 5 Threats actors and their motives ……………………………………………………………………………. 6 Who were responsible for the attacks ……………………………………………………………………. 7 Strategic Shifts in Response to attacks ……………………………………………………………………. 8 Conclusions ……………………………………………………………………………………………………………. 10 Introduction The Baltic state of Estonia was attacked by hackers in April of 2007. Scores of government and private sector website were shut down. Estonian’s daily activities, such as pumping gas or making withdrawals from ATM machines were severely impacted. The architecture of the Internet allowed networks of bots, called botnets, to direct millions of packets to the servers of the Estonian targets, overloading and rendering them inaccessible to visitors. Digital traffic from servers ranging all the way to Peru, Vietnam and the United States overwhelmed Estonian websites, overloading their buffers with superfluous data. At the apex of this DDoS flooding, government websites that had been receiving 1,000 visits each day were suddenly inundated with 2,000 per second (Crouch, Pg 1). No overt financial motivations were discovered as the driver of these attacks, with the principal motivation being political...
Words: 2634 - Pages: 11
...AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps (pg.3) b) Port Scans (pg.4) 3) Recommendations & Conclusion (pg.5) 4) References (pg.7) Ping Sweeps & Port Scans While running businesses, owners must be aware of crucial security threats that their organizations are exposed to in order to formulate effective strategies of mitigating potential risks. Statistics show that there are numerous computer threats that can put an organization’s success in jeopardy especially if they are never detected and controlled beforehand. Examples of such threats are ping sweeps and port scans, which are actually nefarious computer activities that can be used by hackers and crackers to access sensitive business information (Teo, 2000; Wild Packet, 2002). Ping sweeps and port scans can possibly go unnoticed if security measures to detect and block them are not put in place and can have dangerous repercussions on a business. Fortunately, there are many ways through which organizations can detect and eliminate potential damages associated with the activities. In this paper, therefore, the author seeks to establish the impact that ping sweeps and port scans can have on a business...
Words: 1200 - Pages: 5
...postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in other network environments. For example, many enterprise networks employ firewalls to restrict connectivity to and from the internal networks used to service more sensitive functions, such as accounting or personnel. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to its systems and resources. Inclusion of a proper firewall provides an additional layer of security (Broida, 2011). This research paper will give a background on firewalls. The background will cover an overview of firewall technologies, as well as firewall technologies, the common requirements of firewalls, and firewall policies. This paper will also give an analysis of firewalls which will consist of what I have learned in doing this research and my opinion on the research. Overview of Firewall Technologies Several types of firewall technologies are available. One way of comparing their capabilities is to look at the Transmission Control Protocol/Internet Protocol [TCP/IP] layers that each is able to examine. TCP/IP communications are composed of four layers that work together to transfer data between hosts. When a user wants to transfer data across networks, the data is passed from the highest layer through intermediate layers to the lowest layer, with each layer adding more information. The lowest layer sends the accumulated data...
Words: 3077 - Pages: 13
...of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on the knowledge derived through online resources such as online publications, journals and research papers. ORIGIN OF STEGANOGRAPHY As information hiding techniques is receiving enormous attention lately, it was also used way back in Greece. Herodotus...
Words: 1519 - Pages: 7
...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...
Words: 34575 - Pages: 139
...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...
Words: 23991 - Pages: 96
...Table of Contents CHAPTER 1 …………………………………………………………………….. 4 INTRODUCTION………..……………………………………………………….4Aim & Objective of Research …………………………………………………..4 Research Questions …………………………………………………………….5 Hypothesis ………………………………………………………………………..5 CHAPTER 2 ……………………………………………………………………...6 LITERATURE REVIEW …………………………………………………………6 Overview of Rootkit Technology ……………………………………………….6 How a Rootkit Functions ….……………………………………………………6 Functionality Approaches of Rootkit ……………………………….…………..7 Types of Rootkit ………………………………………………………………….8 CHAPTER 3 …………………………………………………………………….11 DISCUSSION ………………………………………………………………….11 Rootkit Detection & Prevention ……………………………………………….11 Rootkit Prevention & Removal Approaches …………………………………12 Rootkit Detection & Prevention Tools ………………………………………..13 CHAPTER 4 …………………………………………………………………….14 CONCLUSION……………………………………………………………..……14 CHAPTER 5 ………………………………………………………….…………15 REFERENCES …………………………………………………………………15 EXECUTIVE SUMMARY This research paper is divided into 5 main chapters like introduction, literature review, discussion, conclusion and references. The major points of this detailed research are summarized as below. * Rootkit technologies cause severe security attacks in today’s cyber world. This research discusses the significance of effective security strategies that should be formulated against security attacks. * Detailed analysis of rootkit technologies and functionalities are done. Different rootkit types, attack...
Words: 2465 - Pages: 10
...Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data,...
Words: 9337 - Pages: 38
...Department of Electrical and Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address...
Words: 9748 - Pages: 39
...SECURING CLOUD NETWORK NODES AGAINST DoS ATTACKS Turnitin Score 15% Boman K. Avong Health Informatics and Administration University of Maryland University College Author Note This research paper is prepared for ITEC 610 9043 taught by Dr. Richard Taylor of the University of Maryland University College Abstract Cloud computing is an emerging technological advancement and in recent times the technology has gained popularity because of its ability to increase system performance, efficient use of computer resources and also scalability. As with any internet technology, security is a big challenge for cloud computing services. Denial of Service (DoS) attacks targeted at cloud end node systems are possible because of how vulnerable these node systems are. The level of security at the node systems is not matched to that at the server level. Cloud node networks are the major entry points for DoS attacks and other malicious attacks in a cloud computing environment. This paper will discuss various DoS attacks and techniques and also discuss the role of Distributed Denial of Service (DDoS) on distributed computer networks. I will also discuss how DoS attacks are the major threats to cloud services, entry points of DoS which are cloud end nodes and recommend how these attacks can be mitigated. DoS attacks on the cloud node computers are the major security challenges cloud services face. I will also recommend techniques that can prevent DoS on cloud node networks. Introduction ...
Words: 2565 - Pages: 11