Download

Download

Featured Posts

Featured Articles
All Stories

Download: DEVELOPING PORT SCANNING DETECTOR PROGRAM


    DEVELOPING PORT SCANNING DETECTOR PROGRAM

                                                          ABSTRACT

                                    The project “Developing Port Scanning Detector Program” is designed using Microsoft Visual Studio.Net 2005 as front end and Microsoft SQL Server 2000 as backend which works in .Net framework version 2.0. The coding language used
Is C#.Net

                                     The main objective of this project is to develop a host base Port Scanning Detector Program that is able to detect various port scanning activities. As port-scanning activities is the most important first step that hackers will implement in order to commit a hacking, it is vital for network system security to perge the attempt in the beginning. To have a full understanding on how to develop the program, testing on other Port Scanning Detector Tools is carried out. Briefly, the function of the program is to capture incoming packet and tries to verify whether the incoming packet is port scan or not. If it is a port scan, the program will alert the user or system administrator but will not prevent it. The techniques of port scanning that an attacker may use to discover vulnerable services on an Internet host.

                               One possible defense, containment, seeks to limit a sharing data by isolating it in a small subsection of the network. We show that these techniques can stop a scanning host after fewer than 10 scans with a very low false-positive rate. We also augment this approach by devising mechanisms for cooperation that enable multiple containment devices to more effectively detect and respond to an emerging infection. Finally, we discuss ways that a sharing data can attempt to bypass containment techniques in general, and ours in particular.





                                SYSTEM SPECIFICATION

SOFTWARE SPECIFICATION:-

OPERATING SYSTEM        :           Windows XP
ENVIRONMENT                  :           Visual Studio .NET 2005
.NET FRAMEWORK            :           Version 2.0
LANGUAGE                         :           C#.NET
BACK END                           :           SQL SERVER 2000


HARDWARE SPECIFICATION:-            

SYSTEM                                :           Pentium III 700 MHz
            HARD DISK                          :           40 GB
           FLOPPY DRIVE                   :           1.44 MB
           MONITOR                             :           15 VGA colour monitor
           MOUSE                                   :           Logitech.
RAM                                       :           128 MB
           KEYBOARD                          :           110 keys enhanced.



4:05 PM - By Admin 1

1 comments:

Download:THRASHING TEXT FILE IN ACOUSTIC (WAV) FILES USING LOW BIT ENCODING STEGANOGRAPHY


THRASHING TEXT FILE IN ACOUSTIC (WAV) FILES USING LOW BIT ENCODING STEGANOGRAPHY

ABSTRACT


This Project Titled “Data Hiding in Audio files” is the software developed for hiding information which uses the technology called as Steganography –derived from the Greek words meaning, “Covered writing”, is the art of hiding information in ways that prevent its detection.

It is a method akin to covert channels, and invisible links, which add another step in security. A message in cipher text may arouse suspicion while an invisible message is not. Digital stenography uses a host data or message known as a “Container” or “Cover” to hide another data or message in it. The conventional way of protecting information was to use a standard symmetric or asymmetric key system in encryption. Steganography can also be used to place a hidden “trademark” in images, music, and software, a technique referred to as watermarking.

To ensure the privacy of the communication between two parties, various new methods are being developed. Cryptography being the mother to all those projects. However, cryptography is like a tool, it can do as well as it is programmed to do. Also, there are various different techniques that can be implemented to attain a certain level of security. Here we implement a technique for data hiding in audio images, known as Audio file Steganography.

First the audio file which behaves as carrier file is selected. Then a message or a text file to be embedded in audio is selected. Then a key file is selected. The key file contains characters whose ASCII values are taken for encryption. Then the file is embedded in audio using low bit encoding mechanism and extraction of embedded message is being done vice-versa.



SOFTWARE REQUIREMENTS:-

Operating system                 :           Windows XP Professional
           Front End                               :           Microsoft Visual Studio .Net 2003
Coding Language                 :           C# .Net



HARDWARE REQUIREMENTS:-            

SYSTEM                            :   Pentium III 700 MHz
            HARD DISK                      :  40 GB
           FLOPPY DRIVE                :   1.44 MB
           MONITOR                         :   15 VGA colour monitor
           MOUSE                              :   Logitech.
           RAM                                   :   128 MB
           KEYBOARD                      :   110 keys enhanced.


3:54 PM - By Admin 0

0 comments:

Download:A FORMAL FRAMEWORK FOR AUTOMATED ROUND-TRIP SOFTWARE ENGINEERING IN STATIC ASPECT WEAVING AND TRANSFORMATIONS


A FORMAL FRAMEWORK FOR AUTOMATED ROUND-TRIP SOFTWARE ENGINEERING IN STATIC ASPECT WEAVING AND TRANSFORMATIONS


Abstract


Formal framework is an improved version of an approach to Automated Round-trip software Engineering. ARE is a demanding problem in a wide range of modeling and programming systems. The goal of ARE is automatically assure consistency between different interrelated systems artifacts. It is applicable to a broad class of source level code refactoring systems where actions such as pre processing, static action weaving, automatic rewrites and manual editing are encoded as trees that are statically woven into core. The refactoring process is composed of a series of weaving steps. Its transforms an initial, possibly empty, core into a final source program. As the major contribution we formally show how, given a tree-shaped intermediate representation of a program and an ancillary transposition tree, manual edits in statically woven oven code can consistently be mapped back to their proper source of origin, which is either in the application core or in an element in the asp aspect space. Invasive Interactive parallelization builds around interactive static preprocessing of sequential programs where a number of parallelizing statements.

SYSTEM REQUIREMENTS

Hardware Requirements

            Processor                     :           Pentium III / IV
            Hard Disk                   :           40 GB
            Ram                             :           256 MB
Monitor                       :           15VGA Color
            Mouse                         :           Ball / Optical
            Keyboard                    :           102 Keys
           
Software Requirements

Operating System       :           Windows XP professional
Front End                    :           Microsoft Visual Studio .Net 2005
Language                    :           Visual C#.Net
Back End                    :           SQL Server 2000
3:42 PM - By Admin 0

0 comments:

Labels

AI PROJECTS (8) ALL DEPT (42) BCA (22) BE (13) BSC (20) BTECH (17) C PROJECTS (4) C#.NET (19) C++ PROJECTS (2) CHEMISTRY (3) CIVIL (25) CSE (94) DIPLOMA (22) DOWNLOADS (60) ECE (37) EEE (39) FINAL YEAR PROJECTS (30) HOW TO (58) HTML PROJECTS (4) IEEE PROJECTS (108) IT (85) MATLAB PROJECTS (8) MBA (1) mca (73) ME (19) mech (4) MINI PROJECTS (97) MSC (17) MTECH (18) MYSQL PROJECTS (6) NETWORK PROJECTS (7) OTHER PROJECTS (67) OTHERS (28) PAPER PRESENTATION (4) PG (18) PHP PROJECTS (7) PROJECTS (5) SOURCE CODES (22) SYSTEM PROJECTS (15) UG (17) VB PROJECTS (15) WHITE PAPER (19)

Blog Archive

Total Pageviews

Discussion

Followers

Powered by Blogger.
back to top
Don't Forget To Join US Our Community
×