Protocol Scrubbing: Network Security Through Transparent Flow Modification
#1

Protocol Scrubbing: Network Security Through Transparent Flow Modification
Abstract: This paper describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker™s ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks”attacks that use ambiguities to subvert detection”on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host™s operating system.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: security protocol for s ensor nw, transparent car seminar, transparent technology, automobile modification ppt, seminar on hind limb and their modification, protocol scrubbing ppt, seminar on transparent techonology,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Micro Controller based Security System using Sonar seminar projects crazy 3 3,656 28-09-2014, 05:50 PM
Last Post: Guest
  A neural network based artificial vision system for licence plate recognition on reception projectsofme 2 2,765 27-07-2013, 11:57 AM
Last Post: computer topic
  CONTROL AND ANALYSIS OF A UNIFIED POWER FLOW CONTROLLER project topics 5 3,762 24-06-2013, 08:41 PM
Last Post: lenovouser73
  Secured Data Transmission through Network seminar surveyer 2 2,320 26-04-2013, 02:02 PM
Last Post: computer topic
  Home Security System A Project Report electronics seminars 16 26,112 22-04-2013, 12:58 PM
Last Post: computer topic
  Automatic power meter reading system using GSM network Electrical Fan 16 14,406 11-04-2013, 11:02 AM
Last Post: computer topic
  FingerPrint Based Security System seminar topics 5 8,232 10-03-2013, 05:23 PM
Last Post: Guest
  AUTOMATIC STREET LIGHT OPERATION THROUGH SMS project report helper 4 5,314 13-01-2013, 12:52 PM
Last Post: Guest
  Wireless Power Reception through Rectenna seminar class 1 2,503 22-12-2012, 11:38 AM
Last Post: seminar details
  RFID BASED ATTENDANCE CUM SECURITY SYSTEM computer girl 1 1,313 19-12-2012, 12:04 PM
Last Post: seminar details

Forum Jump: