ABSTRACT
This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks--attacks that use ambiguities to subvert detection--on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host's operating system.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 AIMS AND OBJECTIVE
1.3 PURPOSE OF STUDY
1.4 AIMS AND OBJECTIVES OF STUDY
1.5 SCOPE OF THE STUDY
1.6 LIMITATION OF THE STUDY
1.7 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSION OF THE SUBJECT MATTER
CHAPTER FOUR
THE FUTURE, IMPLICATIONS AND CHALLENGES OF THE SUBJECT MATTER FOR THE SOCIETY
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/2956/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133
"Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/2956/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133>.
"Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/2956/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133>.
"Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/2956/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133.
- Related Works
- Windows Multi File Search Utility
- Design And Implementation Of A Computerised Rural Electrification Information System For A Local Government Authority (lga) (a Case Study Of Enugu South L.g.a)
- Provision Of A Mobile Value Added Location Based Services Of Hotels Within New Haven And Independence Layout In Enugu State
- A Virtual Private Network Using Java 9 (a Case Study Of Uba Enugu)
- Design And Implementation Of Nitc Student Information System (case Study Of First Bank Training Institute Enugu)
- Internet Security
- Design And Implementation Of A Computerised Traffic Offence Documentation System. (case Study Of Federal Road Safety Commissioner, Enugu)
- Design And Implementation Of A Bill Of Materials Processing System (a Case Study Of Emenite Nig. Ltd. Emene, Enugu)
- Design And Implementation Of A Computerised Bill Of Material Processing System (a Case Study Of Anammco, Enugu)
- Design And Implementation Of A Computer Based Loan Scheme Management System (a Case Study Of Harvard Trust Bank Enugu)