Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Protocol Scrubbing: Network Security Through Transparent Flow Modification
Post: #1

Protocol Scrubbing: Network Security Through Transparent Flow Modification
Abstract: This paper describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker™s ability to determine the operating system of a protected host. As an example, this paper presents the implementation of a TCP scrubber that eliminates insertion and evasion attacks”attacks that use ambiguities to subvert detection”on passive network-based intrusion detection systems, while preserving high performance. The TCP scrubber is based on a novel, simplified state machine that performs in a fast and scalable manner. The fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities from flows that can reveal implementation-specific details about a host™s operating system.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: protocol scrubbing abstract, abstract of modification of carburettor, network security through steganography, new drug design for blood cancer through pentostatin modification studies pdf, seminar on hind limb and their modification, modification of groundnut decorticator machine, seurity protocol for sansor network with report,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Micro Controller based Security System using Sonar seminar projects crazy 3 2,549 28-09-2014 05:50 PM
Last Post: Guest
  A neural network based artificial vision system for licence plate recognition on reception projectsofme 2 1,646 27-07-2013 11:57 AM
Last Post: computer topic
  CONTROL AND ANALYSIS OF A UNIFIED POWER FLOW CONTROLLER project topics 5 3,707 24-06-2013 08:41 PM
Last Post: lenovouser73
  Secured Data Transmission through Network seminar surveyer 2 1,580 26-04-2013 02:02 PM
Last Post: computer topic
  Home Security System A Project Report electronics seminars 16 24,050 22-04-2013 12:58 PM
Last Post: computer topic
  Automatic power meter reading system using GSM network Electrical Fan 16 12,715 11-04-2013 11:02 AM
Last Post: computer topic
  FingerPrint Based Security System seminar topics 5 7,007 10-03-2013 05:23 PM
Last Post: Guest
  AUTOMATIC STREET LIGHT OPERATION THROUGH SMS project report helper 4 4,303 13-01-2013 12:52 PM
Last Post: Guest
  Wireless Power Reception through Rectenna seminar class 1 1,888 22-12-2012 11:38 AM
Last Post: seminar details
  RFID BASED ATTENDANCE CUM SECURITY SYSTEM computer girl 1 769 19-12-2012 12:04 PM
Last Post: seminar details