PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION

  • Ms Word Format
  • 66 Pages
  • ₦3000
  • 1-5 Chapters

PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION

Abstract:

This paper describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker’s ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks-attacks that use ambiguities to subvert detection-on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host’s operating system.

Chapter one

Introduction

Background of the study

Statement of the problem

Purpose of the study

Significance of the study

Limitation of the study

Chapter two

Review of literature

Chapter three

Research design and methodology

Sources of data

Location of data

Method of investigation

Chapter four

Findings

Chapter five

Recommendation and conclusion

BIBLIOGRAPHY.

CHAPTER ONE

INTRODUCTION

0 Shares:
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like