My Projects

Hi readers...

Here you can find my major,internship and other projects that I developed,participated at college level.Along with this I would like to share my presentations, seminars.


Internship: 

Project Name : Development of web based intranet chatting system 

      As part of my academic schedule we are supposed to 

a internship for 3 months of duration in 3rd year of engineering.There are four members in my group namely Venaktesh.B,Nagaraju.B,RamaSwamy.B and me.
We have done "Development of Web based Intranet Chatting System" project  at ECIL-ECIT Ameerpet Center, Hyderabad.

It mainly aims at providing basic user-friendly  chatting application which is very much useful within organization or campus.


Download links: intranet chatting-ppt and intranet chatting report



Seminar at TechSangamam :

 Torrent File Sharing

(It is my seminar along with my friend preetham, exhibited at TechSangamam conducted by CSE Dept at RGU IIIT Basar.

Institute : International Institute of Information Technology(IIIT)
College  : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Authors Profile : S.Preetham Kumar,D.Shiva

Download links : Presentation and Report

Participant profile :


Sno
Id
Name
Contact
E-mail
1
B081086
S.Preetham
9494873864
preethammaestro@gmail.com
2
B082533
D.Shiva
7382030406
dshivaiiit@gmail.com


Introduction :

In this 21st century, Internet has become an indispensable part in everybody’s life. Everybody uses internet these days and some people without actually knowing what is it and how it works. Internet collaborated with world wide web has revolutionized the way in which data gets exchanged. This world wide web predominantly uses HTTP(Hyper Text Transfer Protocol) to transfer the data.

We all use internet to search for desired information, to use e-mail, watch videos and many more. If we encounter the information or data that we are questing for, then sometimes we DOWNLOAD them to our local machine so that we can access the same in future instead of searching the web each time we need it.
We download different files from web like documents, softwares, images, audio, video etc. with file sizes ranging from KB to GBs. All these data is mounted somewhere in the servers located in different parts of the world.
There are millions of people who use internet to download required information. Now there will be some famous huge sized files(may be docs, images, videos) which are most frequently downloaded by most of the internet users (Ex:- The Titanic Movie).
What if many people want to download the same file parallelly? The servers may not able serve this multiple requests. There is a chance of temporary hanging up of servers. 






















And the clients with high internet bandwidth may somehow manage to download but what about low bandwidth clients? Here the sever-client model fails. What is the alternate model ?
So, to satisfy needs of these kinds the “BitTorrent” comes into picture.

                                                         to read  more download above attachments
------------------------------------------------------------------------------------------------------------------------

Paper presentation at Science and Technology fair 



    Project name : Intrusion Detection System(IDS) :


(It is my Poster presentation for college science fair and technology fair) Institute : International Institute of Information Technology(IIIT)
College  : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Authors Profile : S.Gagan Kumar,D.Shiva

Download Links: IDS ppt and IDS Poster
Details of the students:

S.No
Student ID
Name
Email
Contact
1
B083177
S. Gagan
8500060682
2
B082533
D. Shiva
7382030406


Abstract :
Intrusion detection is the act of detecting unwanted traffic on a network or a device.
An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. Many IDS store a detected event in a log to be reviewed at a later date or will combine events with other data to make decisions regarding policies or damage control.

Intrusion detection is just as essential to your network as a burglar alarm system is to commercial buildings or homes where valuables are kept. A good IDS will also include IPS functionality; rather than just telling you someone is breaking into your network, it will do something about it.

Progress of the work :
The IDS consists of at least the following subsystems:
1.IDS engine,
2.Monitoring subsystem,
3.Reporting subsystem,
4.Responding subsystem,
5.Storage,
6.Model base subsystem,
7.Database system, and
8.Feeders.
The IDS engine is the control unit of the intrusion detection system. Its main purpose is to manage the system, i. e., supervise all operations of the intrusion detection system. Its duty depends on the intrusion detection method used. These methods are addressed later in the full paper.

Several ways to categorize intrusion detection systems. The first is based on the scope of the IDS's monitoring; that is, whether it is installed on and uses data from a single host computer, or is a network-based product that monitors traffic on the network as a whole, as well as analyzes data from individual computers.



1)Host-based intrusion detection:

A host-based IDS is one in which the software is installed on a single system and the data from that system is used to detect intrusions. Because the host-based IDS protects the server "at the source," it can more intensely protect that specific computer.
The host-based system usually examines log files on the computer to search for attack signatures. Important system files and executables may also be checked periodically for unexpected changes. A host based system will also monitor ports and trigger an alert if certain ports are accessed.

2)Network-based intrusion detection:

A network-based IDS monitors data from network traffic as well as data from one or more host computers to detect intrusions. A network-based IDS analyzes data packets sent over the network, and generally uses a "promiscuous" network adapter (one that is capable of reading all of the packets sent over the network, rather than just those packets addressed to it). The network-based IDS examines packet headers, which are generally not seen by the host-based IDS. This allows the detection of Denial of Service (DOS) and other types of attacks that may not be detected by a host-based IDS.

How Intrusion Detection System works:

IDS systems can use different methods for detecting suspected intrusions . The two most common broad categories are by patten matching and detection of statistical anomalies.

Pattern matching:
Pattern matching is used to detect known attacks by their "signatures," or the specific actions that they perform. It is also known as signature-based IDS or misuse detection. The IDS looks for traffic and behavior that matches the patterns of known attacks. The effectiveness is dependent on the signature database, which must be kept up to date.
Pattern matching is analogous to identifying a criminal who committed a particular crime by finding his fingerprint at the scene. Fingerprint analysis is a type of pattern matching.
The biggest problem with pattern matching is that it fails to catch new attacks for which the software doesn't have a defined signature in its database.

Statistical anomalies :
Anomaly-based detection watches for deviations from normal usage patterns. This requires first establishing a baseline profile to determine what the norm is, then monitoring for actions that are outside of those normal parameters. This allows you to catch new intrusions or attacks that don't yet have a known signature.
To be effective, response must be as immediate as possible. That's why your IDS needs to include notification features and you need to set them up so that the alerts get to the proper people as quickly as possible after an intrusion is detected.
The best solution for your organization depends on your network's size, security needs, existing security infrastructure, budget and IT department structure and workload.

Components involved in detecting the intrusion :

Sensors: These are deployed in a network or on a device to collect data. They take input from various sources, including network packets, log files, and system call traces. Input is collected, organized, and then forwarded to one or more analyzers.
Analyzers: Analyzers in an IDS collect data forwarded by sensors and then determine if an intrusion has actually occurred. Output from the analyzers should include evidence supporting the intrusion report.
The analyzers may also provide recommendations and guidance on mitigation (action that to take before risk assessment) steps.
User interface : The user interface of the IDS provides the end user a view and way to interact with the system. Through the interface the user can control and configure the system. Many user interfaces can generate reports as well.

Conclusion :

Government funding and corporate interest helped to develop their concept into a tangible technology that eventually found its way into the mainstream of network security. Intrusion detection has indeed come a long way, becoming a necessary means of monitoring, detecting, and responding to security threats. From theory to practice, and finally to commercially viable tools, IDS technology has gone through countless iterations and numerous owners. Nonetheless, the use of intrusion detection as a means of deterring misuse has ultimately become commonplace. Moreover, IDS has become essential.

-----------------------------------------------------------------------------------------------------------
Presentation on Cloud Computing at Student Seminar Series(SSS)

 
                                                                      Cloud computing

Institute : International Institute of Information Technology(IIIT)
College   : Rajiv Gandhi University of Knowledge Technologies(RGUKT)  
Authors Profile  : S.Gagan Kumar,D.Shiva

Details of the students:

S.No
Student ID
Name
Email
Contact
1
B083177
S. Gagan
8500060682
2
B082533
D. Shiva
9553358906




Introduction : 

What is cloud computing??

According to a paper published by IEEE Internet Computing in 2008 "Cloud Computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients that include computers, laptops, handhelds, sensors etc."

Cloud computing refers to a technology wherein data and applications can be maintained and saved online through internet. The benefit is that users can use their personal accounts and applications on internet, that too without installing any software. That means whenever you want, through your browser, you can open and use your files saved on internet.  
The most common example of cloud computing is Gmail. 

How its so important....??
If you accept…
There is an unquenchable thirst for collaboration and sharing.
We can work anywhere at any time – highly mobile workforce You can work wherever you are – at home, traveling, etc.
Then…
How do we achieve mission assurance on the same network?
How do we ensure the network is there when we need it?
What approach should we take?
There cloud computing comes into picture.
   to read more about this project download above attachments


Conclusion :
Imagine the world without cloud computing(social networking,e-mail services etc..)
Indirectly cloud computing becoming a part of our life.Cloud Computing Technology makes our lifes simpler,easy.

--------------------------------------------------------------------------------------------------------------

2 comments:

welcome to my blog

Hi Readers....! Thanks for visiting my blog I am Shiva D graduated from RGUKT Basar in Computer Science domain. Through this blog intend...