ABSTRACT
This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream end-points. The fingerprint scrubber restricts an attacker's ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks - attacks that use ambiguities to subvert detection - on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host's operating system
TABLE OF CONTENTS
TITLE PAGE									
CERTIFICATION								
DEDICATION									
ACKNOWLEDGEMENT							
ABSTRACT									
TABLE OF CONTENTS								
CHAPTER ONE
INTRODUCTION								
1.1	BACKGROUND OF THE STUDY						
1.2	STATE OF THE PROBLEM						
1.3	PURPOSE OF THE STUDY						
1.4	AIMS AND OBJECTIVES						
1.5	SCOPE OF STUDY							
1.6	LIMITATIONS OF STUDY						
1.7	ASSUMPTIONS							
1.8	DEFINITION OF TERMS						
CHAPTER TWO
LITERATURE REVIEW							
CHAPTER THREE
3.1	DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM		
3.2	FACT FINDING METHOD USED					
3.3	ORGANIZATION STRUCTURE						
3.4	OBJECTIVES OF EXISTING SYSTEM				
3.5	INPUT, PROCESS AND OUTPUT ANALYSIS			
3.6	INFORMATION FLOW DIAGRAMS					
3.7	PROBLEMS OF THE EXISTING SYSTEM				
3.8	JUSTIFICATION OF THE NEW SYSTEM				
CHAPTER FOUR
4.1	DESIGN OF THE NEW SYSTEM					
4.2	INPUT SPECIFICATION AND DESIGN				
4.3	OUTPUT SPECIFICATION AND DESIGN				
4.4	FILE DESIGN								
4.5	PROCEDURE CHART							
4.6	SYSTEM FLOW CHART						
4.6.1 SYSTEM REQUIREMENTS							
4.7	IMPLEMENTATION							
4.7.1	PROGRAM DESIGN							
4.7.2	PROGRAM FLOWCHART						
4.7.3	PSEUDO CODE							
4.7.4	SOURCE PROGRAM: TEST RUN					
CHAPTER FIVE	
5.0	DOCUMENTATION							
5.1	RECOMMENDATION							
5.2	CONCLUSION								
BIBLIOGRAPHY			
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Protocol Scrubbing Network Security Through Transparent Flow Modification  (case Study Of Pressure World Cafe).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2797/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654
"Protocol Scrubbing Network Security Through Transparent Flow Modification  (case Study Of Pressure World Cafe)." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2797/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654>.
"Protocol Scrubbing Network Security Through Transparent Flow Modification  (case Study Of Pressure World Cafe).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2797/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654>.
"Protocol Scrubbing Network Security Through Transparent Flow Modification  (case Study Of Pressure World Cafe).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2797/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654.
- Related Works
 - Design And Implementation Of A Computerized Information System In A Grocery Business
 - Design And Implementation Of A Computerised Image Transfer System In A Wide Area Network
 - Design And Implementation Of A Computer Based Warehousing Information System (a Case Study Of Nigeria Ports Authority) (npa) Lagos
 - A Near-optimal Multicast Scheme For Mobile Adhoc Network Using Genetic Algorithm
 - Application Of Bill Accounting System For A Hotel Industry (case Study Of Hotel Presidential)
 - Design And Implementation Of Computerized Information System For Small Small Business Enterprise A Case Study Of Enugu Urban.
 - Design And Implementation Of A Computerized Pharmacy Management System ( Case Study Of Juhel Pharmaceuticals Ltd, Enugu)
 - Design And Implementation Of A Computerized Bill Of Quantity System For Quantity Surveyors (a Case Study Of Okolo, Okolo & Co. Enugu)
 - Design And Implementation Of Computerized Medical Duties Scheduling System. (a Case Study Of University Of Nigeria Teaching Hospital)
 - Customer Relationship Management Based On Fleet Service Management
 
