Free Academic Seminars And Projects Reports
network security - Printable Version

+- Free Academic Seminars And Projects Reports (https://easyreport.in)
+-- Forum: Project Ideas And Disscussion (https://easyreport.in/forumdisplay.php?fid=32)
+--- Forum: Engineering Project Ideas (https://easyreport.in/forumdisplay.php?fid=33)
+---- Forum: Computer Science Project Ideas (https://easyreport.in/forumdisplay.php?fid=36)
+---- Thread: network security (/showthread.php?tid=20589)

Pages: 1 2


network security - mvsushmareddy - 08-16-2017

Flexible Rollback Recovery in
Dynamic Heterogeneous Grid Computing

Large applications executing on Grid or cluster architectures
consisting of hundreds or thousands of computational
nodes create problems with respect to reliability.node failures and the need for dynamic
configuration over extensive run-time maybe the sources of the problem. Theft Induced Checkpointing
and Systematic Event Logging methods for fault-tolerance are described here.

INTRODUCTION
GRID and cluster architectures have gained popularity for
computationally intensive parallel applications.The high failure probabilities are due to the fact
that, in the absence of fault-tolerance mechanisms, the failure of
a single node will cause the entire execution to fail.characteristics of a heterogeneous and dynamic environment has to be considered by the fault tolerance mechanism. Besides heterogeneity one has to address the dynamic nature
of the Grid. configuration changes
may be induced by the application as the result of changes of runtime
observable Quality of Service (QoS) parameters.flexible rollback recovery mechanisms that impose no
artificial restrictions on the execution is described here. They consider node and cluster failures
as well as operation-induced unavailability of resources and dynamic topology reconfiguration and do not depend on the
pre-failure configuration of the heterogeneous network.

BACKGROUND
there are two disadvantages associated with redundancy:
1)Only a fixed number of faults can be tolerated depending on
the type of fault.
2)The necessary degree of redundancy may introduce unacceptable
cost associated with the redundant parallel computations.
In information redundancy redundant information
is added that can be used during recovery to reconstruct
the original data or computation.

Logging-based Approaches:
It is based on the fact that the execution of a process can
be modeled as a sequence of state intervals and The execution during
a state interval is deterministic. It can be classified as pessimistic, optimistic or
causal.

Checkpointing-based Approaches:
checkpointing relies on periodically
saving the state of the computation to stable storage. the computation is restarted from one of the previously
saved states if a fault occurs. In this way checkpointing based
methods differ in the way processes are coordinated and in
the derivation of a consistent global state.

EXECUTION MODEL
The general execution model of large Grid applications can be
considered as having two levels:
Level 0:
only
creates the abstraction of the execution state of the application.Here, the program to be executed is viewed as an
abstraction that represents the state symbolizing the future of
an execution.The input to the virtual machine is the sequential input program added with instructions for the
run-time system.

Level 1:
The abstraction created by the level 0 is then used here to actually schedule and
execute the workload.It schedules tasks using
the primitives Task Export, Task Import and Task Execution.This Level implements the dispatcher, whose decisions will be executed at Level 0.it does not depend on the number
of resources like processors.

Work-stealing
The principle of this algorithm is when a process
becomes idle it tries to steal work from another process called
victim. The initiating process is called thief.The run-time environment and primary mechanism for load
distribution is based on this scheduling algorithm.

THEFT INDUCED CHECKPOINTING
Definition of a checkpoint:checkpoints
are with respect to a process, and consist of a copy of its local
Gi, representing the process stack.

Checkpoint protocol definition:
checkpoints creation can be initiated by either workstealing
or at specific checkpointing periods.Checkpoints resulting from work-stealing are
called forced checkpoints. local checkpoints, are the checkpoints which are stored periodically.
after expiration of pre-defined periods.

full report download:
[attachment=1169]


network security - honey - 08-16-2017

please read
http://ieexplore.ieexpl/preabsprintf.jsp?arnumber=4479488
http://ieexplore.ieexpl/preabsprintf.jsp?arnumber=4479488

Algorithm Description:
Logging can be classified as pessimistic, optimistic, or causal. It is based on the fact that the execution of a process can be modeled as a sequence of state intervals. The execution during a state interval is deterministic. However, each state interval is initiated by a nondeterministic event now, assume that the system can capture and log sufficient information about the nondeterministic events that initiated the state interval. This is called the piecewise deterministic (PWD) assumption. Then, a crashed process can be recovered by 1) restoring it to the initial state and 2) replaying the logged events to it in the same order they appeared in the execution before the crash. To avoid a rollback to the initial state of a process and to limit the amount of nondeterministic events that need to be replayed, each process periodically saves its local state. Log based mechanisms in which the only nondeterministic events in a system are the reception of messages is usually referred to as message logging.

Existing System:
Communication Induced Check-pointing protocols usually make the assumption that any process can be check-pointed at any time. An alternative approach which releases the constraint of always check-pointable processes, without delaying any do not message reception nor did altering message ordering enforce by the communication layer or by the application. This protocol has been implemented within Pro-Active, an open source Java middleware for asynchronous and distributed objects implementing the ASP (Asynchronous Sequential Processes) model.

Proposed System:
This paper presents two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. These are transparent protocols capable of overcoming problems associated with both benign faults, i.e., crash faults, and node or subnet volatility. Specifically, the protocols base the state of the execution on a dataflow graph, allowing for efficient recovery in dynamic heterogeneous systems as well as multithreaded applications.


network security - karthik - 08-16-2017

Network Security
RSA Continues
Choose an integer e such that 1 < e < (pq), and e and (pq) share no divisors other than 1 (i.e. e and (pq) are coprime).
e is released as the public key exponent.
RSA Continues
Determine d which satisfies the congruence relation .
Stated differently, ed 1 can be evenly divided by the totient (p 1)(q 1).
d is kept as the private key exponent.
RSA Example
Choose two prime numbers
p = 61 and q = 53
Compute n = pq
Compute the totients of product. For primes the totient is maximal and equals x 1. Therefore
RSA Example Continues
Choose any number e > 1 that is coprime to 3120. Choosing a prime number for e leaves you with a single check: that e is not a divisor of 3120.
e = 17
RSA Example Continues
Compute d such that
d . e = 1 mod (pq)
d = 2753
since 17 2753 = 46801 and 46801 mod 3120 = 1, this is the correct answer.
RSA Example Continues
The public key is (n = 3233, e = 17).

The private key is (n = 3233, d = 2753).
RSA Example Continues
For instance, in order to encrypt m = 123, we calculate
To decrypt c = 855, we tap
Authentication

KERBEROS
In Greek mythology, a many headed dog, the guardian of the entrance of Hades
KERBEROS
Provides a centralized authentication server to authenticate users to servers and servers to users.
Relies on conventional encryption, making no use of public-key encryption
Two versions: version 4 and 5
Version 4 makes use of DES
Kerberos Version 4
Terms:
C = Client
AS = authentication server
V = server
IDc = identifier of user on C
IDv = identifier of V
Pc = password of user on C
ADc = network address of C
Kv = secret encryption key shared by AS an V
TS = timestamp
= concatenation


network security - sreejith.george - 08-16-2017

Network Security begins with a brief look at how to design and implement effective security measures, which begins with a well-planned Security Policy. We open with an assessment of what equipment, data, and software the company has, what the company is trying to protect, what is at risk and what the threats are against those items at risk. This discussion includes who should be involved in the development of company policy and a brief look into possible policy items covering passwords, access, the Internet, firewalls, computer viruses, and encryption. We continue with an overview of backups, destruction of media, response to intrusions/policy violations/incidents, and a recovery plan. Next we provide a brief overview of some threats and a few possible solutions to those threats. Which includes viruses, Trojans, some email issues, denial of service, passwords, sniffers, spoofing, and the role of Telnet in attacks. We are given a brief look at Internet/World Wide Web languages and their security problems. This is followed by a similar discussion about operating systems/network software. The importance of logging and auditing is briefly covered, as are firewalls and the services they provide. Moving on we will look at using encryption for email, communications, and data storage. We will wrap things up with a brief look at some security software packages and training options.


network security - NITISH - 08-16-2017

Description : The mainstay of this project is to secure data/information that flow across the network. Security refers to the protection of data against the Intentional modification, i.e. loss or damage of data. The Network security is guarantees the secure data flow in the network.Confidentialy, Authentication and Data Integrity. Because these three makes a network as secure one. In this project it guarantees i.e. Confidentially, Authentication and Data Integrity. Confidentiality: guarantees that the receiver only knows the original message sent by the sender. Even if the Hackers or Intruders hacks the message on the way, they can t understand the original message. Authentication: is the process of checking /verifying the identity of the sender. Authentication technique tries to vary that a message is coming from an Authentic sender and not from an Imposter. Data Integrity: is the process of validating the message that the received message is an unaltered copy of the sent message. In this project we used three algorithms. These are DES, RSA, SHA algorithms. In this project first the original message which is going to be sent in the network that message is encrypted in two ways. One is 3DES encryption and another is RSA encryption these encryptions are done parallely.
Technology Used : Java ,Swing
Algorithms : RSA ,DES AND SHA algorithms


network security - spurthi - 08-16-2017

A Model of Network Security with Prevention Capability by Using Decoy Technique
a model of network security systems which aims at preventing the attack at the production system in a data center is described. a decoy system is introduced as a part of the strategy to lure the intrusions and a network intrusion detection is applied to it to prevent the intrusion. Whenever an an activity of intrusion is detected by the NIDS, a redirection module is signaled to redirect all the malicious traffics to attack the decoy system instead. Thus the production system is safe from the attack of the intruder. traffic will be simply forwarded to the production system in the normal circumstances. the performance of the model is assessed with the sue of various bandwidths, packet sizes, inter-attack intervals etc.

Get the report here:
http://wasetjournals/waset/v29/v29-34.pdf

more info about the network security can be had form here:
http://seminarsprojects.net/Thread-network-security-full-report--10704?page=2
http://seminarsprojects.net/Thread-network-security-seminars-report


network security - rajanmani78 - 08-16-2017

to get information about the topic network security full report ppt and related topic refer the page link bellow

http://seminarsprojects.net/Thread-network-security-full-report

http://seminarsprojects.net/Thread-network-security-seminars-report

http://seminarsprojects.net/Thread-java-based-networking-security-project-ideas

http://seminarsprojects.net/Thread-network-security-and-firewalls-download-full-seminars-report

http://seminarsprojects.net/Thread-cryptography-and-network-security-ppt

http://seminarsprojects.net/Thread-cryptography-and-network-security-full-report?pid=64148#pid64148

http://seminarsprojects.net/Thread-network-security-full-report--10704

http://seminarsprojects.net/Thread-network-security-seminars-report?page=4

http://seminarsprojects.net/Thread-wireless-network-security

http://seminarsprojects.net/Thread-network-security-full-report?pid=52602

http://seminarsprojects.net/Thread-network-security-report


network security - 123456789 - 08-16-2017

Network consists of company security measures necessary to protect the computer method, and it is a source of concern to the President of each company that makes use of computers. Risk the security of networks and media hacker or competitor may gain access to critical information or sensitive, and may lead to loss of information, or even the complete destruction of the method.


network security - becksey - 08-16-2017

to get information about the topic Network Security full report ,ppt and related topic refer the page link bellow

http://seminarsprojects.net/Thread-network-security-seminars-report

http://seminarsprojects.net/Thread-network-security-full-report

http://seminarsprojects.net/Thread-network-security-project-topics


network security - couger13 - 08-16-2017

My name is amrinder kaur and I am a Mtech student in my first year..i've chosen my thesis topic as network security.please provide me projects and if any reports ,,I dont know how to write thesis..so if any one can please provide me the required material and pattern f thesis..
thanks..