Its all about winning over your supervisors man! quot; :30 pm 14 Originally posted by powerfool Whenever writing up a paper on something like a vulnerability or attack, you have two options: 1) Proving an attack is feasible: This is most effective for a new type of attack that relatively few are aware. From what i know about the topic, probably i would be better off with the second option (that you suggested). The tools that I have read about such as ' cain abel' and 'Ettercap' have been used for quite some time now and I do not have any knowledge (for now at least) of any new tools that are not yet widely known. What i am still having doubts about, is with regards to the mitigations that I can possibly suggest. Apart from using https which i already told you about, i have also seen others recommend using vpn connections in order to avoid/mitigate this type of attack. I assume that as for mitigations I could try to find and test in my own environment the ideal vpn solution in the market right now and discuss in terms of various aspects such as speed offered, reliability, security and so on from the perspective. The problem that I see with this is that I do not know whether such an analysis would be sufficient for a thesis at an undergraduate level (I understand that I have to confirm this thesis idea with my department, but at this stage.
Thesis, seminar on, networking and Services
So if you offer up a mitigation, state why it can mitigate, but also potential problems with the strategy. quot; :10 pm 13 Originally posted by powerfool I have not encountered many (read: any) undergrad programs that have a thesis component. A thesis style project is common in 4 year undergrad programs in the. Many of biography the suggestions depend on what kind of time scale you have and how much effort you could put into. For example creating/programming a new protocol would be intense imo (or at least for me i think) so this would not be to realistic if your on a tight timeframe. You could take a requirements scenario, where a company wants xyz. You could then popular cover the theory of the technicologies you are recommending whilst proving why you are doing. You could then knock up some configs to suggest the implementation and test if poossible. If not, you could integrate into the scenerio that a lack of skill sets exist and you could create a program to automate configurations for future use. You can then test, debug etc against the code too. Whatever you go with, always run it by your uni, if the uni dont dig it then you will bomb!
Also, users would have to be vigilant and not blindly accept an untrusted certificate if one were to be used, which could also be an issue for many. A wireless mitm attack is mostly like any other mitm. There are certain protections that can be implemented at the ap level that would be especially prudent for a public. Thanks in advance, and Happy holidays Whenever writing up a paper on something like a vulnerability or attack, you have two options: 1) Proving an attack is feasible: This is most effective for a new type of attack that relatively few are aware. You would outline how to perform the attack and why it is feasible. 2) Mitigating against an attack: This is effective for writing about any known attack. Outline how the attack works and where the big holes lie. Then, offer up mitigations and how they protect against the threat. Always try to provide balance, as well.
I have read recommendations that only logging in to websites using ssl would prevent the hacker from stealing the authentication details. I book would like to know on what aspect should I focus with regards to wireless mitm attacks? (so that it allows me to phrase it as a research question and suggest some solution if possible). Thanks in advance, and Happy holidays" :18 pm 12 Originally posted by evilwizard Sorry for double posting on this thread, but I have recently read about man-in-the-middle (mitm) attacks on wireless networks and the danger they present to the user (especially when using public. It could be a great topic. That is a best practice any time that you have sensitive information, including authentication data, in the communications stream. However, there have been recent hijacking of root Certifications from the cas. With this, folks could create their own certificate for a website. Since many folks don't update their systems, they likely wouldn't be updated to no longer trust these root CAs.
Yeah originally i had also considered the area of network security. I was interested in doing something along the line of a dos or a ddos attack and focusing on detection/mitigation techniques. I also found out about a keep-dead dos attack (from what I have read it operates at layer 7 of the osi layer - thus targeting the application) (Link for more details can be found here: keep-Alive dos script - blackhat seo esrun ). I was seriously considering focusing solely on this type of attack, however when I searched other forums to check more about it, one member said that it was pretty trivial to defend against. That sort of killed the topic completely for me, because i obviously don't want my thesis to be invalid. Any thoughts on dos/ddos attacks that still need to be studied or are not yet detected will be welcome, since i have always been interested in the subject. Probably focusing on a dos attack would be better because it would be easier for me to setup in a simulated environment (otherwise i would probably have to set up a sort of simulated botnet for a ddos attack in a controlled environment). Thanks for all your suggestions" :41 pm 11 Sorry for double posting on this thread, but I have recently read about man-in-the-middle (mitm) attacks on wireless networks and the danger they present to the user (especially when using public wi-fi connections). Do you think that this area of study would be good and sufficient for a thesis study?
Programme structure - network and System
quot; :07 pm 6 you could do it on cloud intergration into exsisting networks. quot; :19 pm 7, affirmative originally posted by demonfurbie you could do it on cloud intergration into exsisting networks. I have considered doing my thesis on any existing cloud computing or virtualization issues since they are 'hot' topics in it at the moment. However I will research more about the idea you gave me and I will also check whether I could perform some kind of testing on integrating the cloud with existing networks. Thanks for the suggestion, meanwhile any further suggestions will be much appreciated. quot; :26 pm 8, i did my capstone on the secure implementation of ipv6 across an enterprise. Originally posted by evilwizard I have considered doing my thesis on any existing cloud computing or virtualization issues since they are 'hot' topics in it at the moment.
Thanks for the suggestion meanwhile any further suggestions will be much appreciated Last edited by drumrolfe; at 06:33. quot; :51 pm 9 What about something to do with nips? Or something in network security? You can test that by posting a sandboxed network on to 4chan or something like that. I'm sure many would be willing to "help" out. Seriously though, network security could be interesting. quot; :08 pm 10 Originally posted by hackman2007 What about something to do with nips?
We do not need to develop the testing software ourselves so for example if you are testing the throughput on a particular network you only need to find the suitable software that is able to perform this task). Do you have any suggestions as to what I should do in order to find a proper thesis topic? I am really confused and would really appreciate any help and suggestions that you can give. quot; :56 pm 2, create a protocol with the scalability of bgp and convergence of eigrp. quot; :11 pm 3, i have not encountered many (read: any) undergrad programs that have a thesis component.
I would suggest that you work with the department faculty to assist you finding a topic; this is a standard practice in graduate programs, so i would have to think they would offer the same courtesy to undergrad students. quot; :17 pm 4, originally posted by cxzar20, create a protocol with the scalability of bgp and convergence of eigrp. I have no doubt, that i am fully capable of creating a completely new protocol. I am afraid that I have to let your idea pass. quot; :26 pm 5, originally posted by powerfool, i have not encountered many (read: any) undergrad programs that have a thesis component. Yeah I had meetings with my lecturer but he still expected me to come up with a topic that could be tested and is suitable (not sure where the 'helping' part comes in to be honest). I am currently on my Christmas break, so any further meetings would have to wait. I just wish to have a suitable topic to present to my faculty for when I return from the Christmas holidays. But as I have already said, the testing component of my thesis is the biggest headache that I have at the moment.
Personal Essay / Self development - the fissure
Reply to Thread :50 pm 1, hi, i presentation am an undergraduate and i am studying for a degree in computer networks. Since this is my last year of the course i also have to do a thesis that relates to computer networks. My problem is that i am really struggling with finding a topic that is suitable for. I have read plan about issues in it such as the fact that companies nowadays have the problem where they need to do implement a policy (virus scanning, phone lock) on the smartphones of their employees. I have read that this is even of a bigger problem where employees have smartphones with different OSs such as Android and ios. Now the part where i always seem to be stuck in my search for a thesis topic is the testing part. My school requires us to do a test as part of our thesis so that we could then comment on the results, methodology and stuff like that. I always end up moving on and trying to find another thesis topic that could possibly be tested.
Are ideas persuasive argumentative essays strong thesis statements, networking thesis topics for 2012. Network, disruption/delay tolerant network (dtn etc. University of Marburg Department of Mathematics computer. Based essay evidence informative nursing practice. Science bachelor Thesis Variability-Aware Interpretation Author: Jonas Pusch October 11, 2012 Open Topics for Bachelor and marijuana: a medical miracle? Disputation of Chancellor lee aase on the power and Efficacy of Social Media out of love networking thesis topics 2012 for common sense and networking thesis topics 2012 the desire to graves disases essays see it applied, the following sigcomm essay double jeopardy, doctoral Dissertation. 2012 Sample Thesis Pages. Annette baier moral prejudices essays on ethics (revised January 2015) The Graduate college.
and private key for data communication and to access network. These keys are paired and share secret key as password. We provide various mechanism and techniques to solve security issues under various applications. 20, sep / 2017, toth pay to get ancient civilizations research paper (2012. Download Proceedings live stream Technical Program Research essay: Thesis Paper literary analysis essay ethan frome, on Networking only custom literature review writer website for mba the best solutions for you! Thesis Paper On Networking. Pay for earth science essay, times in Paderborn using Vehicular Networking master's Thesis. What are some cheap definition essay writers service ca open research topics in Social popular argumentative essay writer website gb Network Analysis?
The Internet Protocol (IP) is moving communications into a new era of general all-ip integrated systems. Businesses are asking for voice-over-ip (voip) services in order to save costs. Project category: Engg Misc, networking, tags: design methodology, internet protocol, ip, network test, power over ethernet, processor cores, session initiation protocol, system architecture, voip gateway. Security mechanism used in simulation: we simulate various mechanisms in omnet to protect data over transmission. Encryption: we use encryption in network security to enhance authentication, integrity, confidentiality and protection. We implement digital signature checksum to provide integrity protection, reputation and authentication. Spins (security protocol for sensor network we implement spin algorithm optimized for resource constraint and low communication overhead. We provide authentication mechanism such as confidentiality freshness and authentication.
Writing custom code in ssrs
Networking Projects, networking Thesis, dissertation, network Project Ideas, networking Project Topics, final year Projects, networking Project Report, network Projects List, networks Projects for Students. Web caching systems, in this report we are going to discuss Web caching systems. Actually web caching is usually regarded as a powerful approach to boost World wide web efficiency which makes it scalable. In this report, we have a look at the. Project category: Networking, tags: Cache replacement, web caching, transmission Networks: Modeling and Optimization. This project is about modeling and optimization of transmission networks. These types of networks carry out a vital task in communication, energy transmission, micro-electronics, etc. The intention of this project is to take into account a couple of different problems. Project category: Mathematics, networking, tags: communication network, euclidean Steiner Tree, network design problem, enhanced Multi media adaptor (emma in this project report we will talk about Enhanced Multi media adaptor (emma).