PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)

ABSTRACT
This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream end-points. The fingerprint scrubber restricts an attacker's ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks - attacks that use ambiguities to subvert detection - on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host's operating system

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS

CHAPTER ONE
INTRODUCTION
1.1BACKGROUND OF THE STUDY
1.2STATE OF THE PROBLEM
1.3PURPOSE OF THE STUDY
1.4AIMS AND OBJECTIVES
1.5SCOPE OF STUDY
1.6LIMITATIONS OF STUDY
1.7ASSUMPTIONS
1.8DEFINITION OF TERMS

CHAPTER TWO
LITERATURE REVIEW

CHAPTER THREE
3.1DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2FACT FINDING METHOD USED
3.3ORGANIZATION STRUCTURE
3.4OBJECTIVES OF EXISTING SYSTEM
3.5INPUT, PROCESS AND OUTPUT ANALYSIS
3.6INFORMATION FLOW DIAGRAMS
3.7PROBLEMS OF THE EXISTING SYSTEM
3.8JUSTIFICATION OF THE NEW SYSTEM

CHAPTER FOUR
4.1DESIGN OF THE NEW SYSTEM
4.2INPUT SPECIFICATION AND DESIGN
4.3OUTPUT SPECIFICATION AND DESIGN
4.4FILE DESIGN
4.5PROCEDURE CHART
4.6SYSTEM FLOW CHART
4.6.1 SYSTEM REQUIREMENTS
4.7IMPLEMENTATION
4.7.1PROGRAM DESIGN
4.7.2PROGRAM FLOWCHART
4.7.3PSEUDO CODE
4.7.4SOURCE PROGRAM: TEST RUN

CHAPTER FIVE
5.0DOCUMENTATION
5.1RECOMMENDATION
5.2CONCLUSION
BIBLIOGRAPHY

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Possibility, A. (2018). PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE). Afribary. Retrieved from https://afribary.com/works/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654

MLA 8th

Possibility, Aka "PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)" Afribary. Afribary, 29 Jan. 2018, https://afribary.com/works/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654. Accessed 22 Nov. 2024.

MLA7

Possibility, Aka . "PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)". Afribary, Afribary, 29 Jan. 2018. Web. 22 Nov. 2024. < https://afribary.com/works/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654 >.

Chicago

Possibility, Aka . "PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)" Afribary (2018). Accessed November 22, 2024. https://afribary.com/works/protocol-scrubbing-network-security-through-transparent-flow-modification-case-study-of-pressure-world-cafe-6654