Protocol Scrubbing: Network Security Through Transparent Flow Modification
#1

Protocol Scrubbing: Network Security Through Transparent Flow Modification
Abstract: This paper describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker™s ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks”attacks that use ambiguities to subvert detection”on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host™s operating system.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: transparent electronic report, seminar report on modification of carburetor, transparent computing cs branch seminar topic, calculating the flow through a toothed labyrinth, transparent, histogram modification in image enhancement ppt, biogas scrubbing and compressing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Micro Controller based Security System using Sonar seminar projects crazy 3 3,636 28-09-2014, 05:50 PM
Last Post: Guest
  A neural network based artificial vision system for licence plate recognition on reception projectsofme 2 2,752 27-07-2013, 11:57 AM
Last Post: computer topic
  CONTROL AND ANALYSIS OF A UNIFIED POWER FLOW CONTROLLER project topics 5 3,762 24-06-2013, 08:41 PM
Last Post: lenovouser73
  Secured Data Transmission through Network seminar surveyer 2 2,310 26-04-2013, 02:02 PM
Last Post: computer topic
  Home Security System A Project Report electronics seminars 16 26,067 22-04-2013, 12:58 PM
Last Post: computer topic
  Automatic power meter reading system using GSM network Electrical Fan 16 14,335 11-04-2013, 11:02 AM
Last Post: computer topic
  FingerPrint Based Security System seminar topics 5 8,197 10-03-2013, 05:23 PM
Last Post: Guest
  AUTOMATIC STREET LIGHT OPERATION THROUGH SMS project report helper 4 5,299 13-01-2013, 12:52 PM
Last Post: Guest
  Wireless Power Reception through Rectenna seminar class 1 2,494 22-12-2012, 11:38 AM
Last Post: seminar details
  RFID BASED ATTENDANCE CUM SECURITY SYSTEM computer girl 1 1,301 19-12-2012, 12:04 PM
Last Post: seminar details

Forum Jump: