Hi readers...
Here you can find my major,internship and other projects that I developed,participated at college level.Along with this I would like to share my presentations, seminars.
Internship:
Project Name : Development of web based intranet chatting system
As part of my academic schedule we are supposed to
a internship for 3 months of duration in 3rd year of engineering.There are four members in my group namely Venaktesh.B,Nagaraju.B,RamaSwamy.B and me.
We have done "Development of Web based Intranet Chatting System" project at ECIL-ECIT Ameerpet Center, Hyderabad.
It mainly aims at providing basic user-friendly chatting application which is very much useful within organization or campus.
Download links: intranet chatting-ppt and intranet chatting report
Project Name : Development of web based intranet chatting system
As part of my academic schedule we are supposed to
a internship for 3 months of duration in 3rd year of engineering.There are four members in my group namely Venaktesh.B,Nagaraju.B,RamaSwamy.B and me.
We have done "Development of Web based Intranet Chatting System" project at ECIL-ECIT Ameerpet Center, Hyderabad.
It mainly aims at providing basic user-friendly chatting application which is very much useful within organization or campus.
Download links: intranet chatting-ppt and intranet chatting report
Seminar at TechSangamam :
(It is my seminar along with my friend preetham, exhibited at TechSangamam conducted by CSE Dept at RGU IIIT Basar.
Institute : International Institute of Information Technology(IIIT)
College : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Participant profile :
Sno
|
Id
|
Name
|
Contact
|
E-mail
|
1
|
B081086
|
S.Preetham
|
9494873864
|
preethammaestro@gmail.com
|
2
|
B082533
|
D.Shiva
|
7382030406
|
dshivaiiit@gmail.com
|
Introduction :
In this 21st
century, Internet has become an indispensable part in everybody’s
life. Everybody uses internet these days and some people without
actually knowing what is it and how it works. Internet collaborated
with world wide web has revolutionized the way in which data gets
exchanged. This world wide web predominantly uses HTTP(Hyper Text
Transfer Protocol) to transfer the data.
We all use internet
to search for desired information, to use e-mail, watch videos and
many more. If we encounter the information or data that we are
questing for, then sometimes we DOWNLOAD them to our local machine so
that we can access the same in future instead of searching the web
each time we need it.
We download
different files from web like documents, softwares, images, audio,
video etc. with file sizes ranging from KB to GBs.
All these data is mounted somewhere in the servers located in
different parts of the world.
There are millions
of people who use internet to download required information. Now
there will be some famous huge sized files(may be docs, images,
videos) which are most frequently downloaded by most of the internet
users (Ex:- The Titanic Movie).
What if many people
want to download the same file parallelly? The servers may not able
serve this multiple requests. There is a chance of temporary hanging
up of servers.
And the clients with high internet bandwidth may somehow manage to download but what about low bandwidth clients? Here the sever-client model fails. What is the alternate model ?
So, to satisfy
needs of these kinds the “BitTorrent” comes into picture.
to read more download above attachments
------------------------------------------------------------------------------------------------------------------------to read more download above attachments
Paper presentation at Science and Technology fair
Project name : Intrusion Detection System(IDS) :
(It is my Poster presentation for college science fair and technology fair)
Institute : International Institute of Information Technology(IIIT)
College : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Authors Profile : S.Gagan Kumar,D.Shiva
College : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Authors Profile : S.Gagan Kumar,D.Shiva
Download Links: IDS ppt and IDS Poster
Details of the students:
S.No
|
Student
ID
|
Name
|
Email
|
Contact
|
1
|
B083177
|
S.
Gagan
|
8500060682
|
|
2
|
B082533
|
D.
Shiva
|
7382030406
|
Abstract
:
Intrusion
detection is the act of detecting unwanted traffic on a network or a
device.
An
IDS can be a piece of installed software or a physical appliance that
monitors network traffic in order to detect unwanted activity and
events such as illegal and malicious traffic, traffic that violates
security policy, and traffic that violates acceptable use policies.
Many IDS store a detected event in a log to be reviewed at a later
date or will combine events with other data to make decisions
regarding policies or damage control.
Intrusion
detection is just as essential to your network as a burglar alarm
system is to commercial buildings or homes where valuables are kept.
A good IDS will also include IPS functionality; rather than just
telling you someone is breaking into your network, it will do
something about it.
Progress
of the work :
The
IDS consists of at least the following subsystems:
1.IDS
engine,
2.Monitoring
subsystem,
3.Reporting
subsystem,
4.Responding
subsystem,
5.Storage,
6.Model
base subsystem,
7.Database
system, and
8.Feeders.
The
IDS engine is the control unit of the intrusion detection system. Its
main purpose is to manage the system, i. e., supervise all operations
of the intrusion detection system. Its duty depends on the intrusion
detection method used. These methods are addressed later in the full
paper.
Several
ways to categorize intrusion detection systems. The first is based on
the scope of the IDS's monitoring; that is, whether it is installed
on and uses data from a single host computer, or is a network-based
product that monitors traffic on the network as a whole, as well as
analyzes data from individual computers.
1)Host-based
intrusion detection:
A
host-based IDS is one in which the software is installed on a single
system and the data from that system is used to detect intrusions.
Because the host-based IDS protects the server "at the source,"
it can more intensely protect that specific computer.
The
host-based system usually examines log files on the computer to
search for attack signatures. Important system files and executables
may also be checked periodically for unexpected changes. A host based
system will also monitor ports and trigger an alert if certain ports
are accessed.
2)Network-based
intrusion detection:
A
network-based IDS monitors data from network traffic as well as data
from one or more host computers to detect intrusions. A network-based
IDS analyzes data packets sent over the network, and generally uses a
"promiscuous" network adapter (one that is capable of
reading all of the packets sent over the network, rather than just
those packets addressed to it). The network-based IDS examines packet
headers, which are generally not seen by the host-based IDS. This
allows the detection of Denial of Service (DOS) and other types of
attacks that may not be detected by a host-based IDS.
How
Intrusion Detection System works:
IDS
systems can use different methods for detecting suspected intrusions
. The two most common broad categories are by patten matching and
detection of statistical anomalies.
Pattern
matching:
Pattern
matching is used to detect known attacks by their "signatures,"
or the specific actions that they perform. It is also known as
signature-based IDS or misuse detection. The IDS looks for traffic
and behavior that matches the patterns of known attacks. The
effectiveness is dependent on the signature database, which must be
kept up to date.
Pattern
matching is analogous to identifying a criminal who committed a
particular crime by finding his fingerprint at the scene. Fingerprint
analysis is a type of pattern matching.
The
biggest problem with pattern matching is that it fails to catch new
attacks for which the software doesn't have a defined signature in
its database.
Statistical
anomalies :
Anomaly-based
detection watches for deviations from normal usage patterns. This
requires first establishing a baseline profile to determine what the
norm is, then monitoring for actions that are outside of those normal
parameters. This allows you to catch new intrusions or attacks that
don't yet have a known signature.
To
be effective, response must be as immediate as possible. That's why
your IDS needs to include notification features and you need to set
them up so that the alerts get to the proper people as quickly as
possible after an intrusion is detected.
The
best solution for your organization depends on your network's size,
security needs, existing security infrastructure, budget and IT
department structure and workload.
Components
involved in detecting the intrusion :
Sensors:
These are deployed in a network or on a device to collect data. They
take input from various sources, including network packets, log
files, and system call traces. Input is collected, organized, and
then forwarded to one or more analyzers.
Analyzers:
Analyzers in an IDS collect data forwarded by sensors and then
determine if an intrusion has actually occurred. Output from the
analyzers should include evidence supporting the intrusion report.
The
analyzers may also provide recommendations and guidance on mitigation
(action that to take before risk assessment) steps.
User
interface : The user interface of the IDS provides the end user a
view and way to interact with the system. Through the interface the
user can control and configure the system. Many user interfaces can
generate reports as well.
Conclusion
:
Government
funding and corporate interest helped to develop their concept into a
tangible technology that eventually found its way into the mainstream
of network security. Intrusion detection has indeed come a long way,
becoming a necessary means of monitoring, detecting, and responding
to security threats. From theory to practice, and finally to
commercially viable tools, IDS technology has gone through countless
iterations and numerous owners. Nonetheless, the use of intrusion
detection as a means of deterring misuse has ultimately become
commonplace. Moreover, IDS has become essential.
-----------------------------------------------------------------------------------------------------------
Cloud computing
Institute : International Institute of Information Technology(IIIT)
College : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Authors Profile : S.Gagan Kumar,D.Shiva
Details of the students:
College : Rajiv Gandhi University of Knowledge Technologies(RGUKT)
Authors Profile : S.Gagan Kumar,D.Shiva
Details of the students:
S.No
|
Student
ID
|
Name
|
Email
|
Contact
|
1
|
B083177
|
S.
Gagan
|
8500060682
|
|
2
|
B082533
|
D.
Shiva
|
9553358906
|
Introduction :
What
is cloud computing??
According
to a paper published by IEEE
Internet Computing in
2008 "Cloud Computing is a paradigm in which information is
permanently stored in servers on the Internet and cached temporarily
on clients that include computers,
laptops, handhelds, sensors
etc."
Cloud
computing refers to a technology wherein data and applications can be
maintained and saved online through internet. The benefit is that
users can use their personal accounts and applications on internet,
that too without installing any software. That means whenever you
want, through your browser, you can open and use your files saved on
internet.
The most common example of cloud computing is Gmail.
The most common example of cloud computing is Gmail.
If
you accept…
There
is an unquenchable thirst for collaboration and sharing.
We
can work anywhere at any time – highly mobile workforce You
can work wherever you are – at home, traveling, etc.
Then…
How
do we achieve mission assurance on the same network?
How
do we ensure the network is there when we need it?
What
approach should we take?
There
cloud computing comes into picture.
to read more about this project download above attachments
Conclusion :
Imagine the world without cloud computing(social networking,e-mail services etc..)
Indirectly cloud computing becoming a part of our life.Cloud Computing Technology makes our lifes simpler,easy.
--------------------------------------------------------------------------------------------------------------
Imagine the world without cloud computing(social networking,e-mail services etc..)
Indirectly cloud computing becoming a part of our life.Cloud Computing Technology makes our lifes simpler,easy.
--------------------------------------------------------------------------------------------------------------
good work shiva
ReplyDeleteThis comment has been removed by a blog administrator.
Delete