• Improving Network Security Using Elliptic Curve Cryptosystem

  • CHAPTER TWO -- [Total Page(s) 11]

    Page 5 of 11

    Previous   1 2 3 4 5 6 7 8 9    Next
    • •    User interface
      The user interface to an IDS enables a user to view output from the system or control the behavior of the system. In some systems, the user interface may equate to a ―manager,‖
      ―director,‖ or ―console‖ component.
      iv.    Architecture
      The example of typical architecture is shown in figure. The sensors/agents components monitor and analyze activities. A management server is a centralized device that receives information from the sensors or agents and manages them. A database server is a repository for event information recorded by sensors, agents, and/or management servers. A console is a program that provides an interface for the IDS’susers and administrators.

      v.    Intrusion prevention technology:
      IPS is known as a new technology which is developed after the intrusion detection technology; it inherits all the advantages of intrusion detection intrusion prevention adds a module which is able to response the intrusion on its own initiative. It makes use of marks left by the intruders to effectively discover the illegal intrusion from external or internal.
      Once discovered the aggressive behavior, it will cut off the connections actively. It is an extremely important part in network security.
      vi.    Characteristics of IPS
      IPS is a system in which firewall is tightly coupled with IDS, and it can react to the changes of the network environment, IPS can find out intrusion action and prevent them, it is one of the promising technologies of the network security.
      IPS is not roughly combining IDS with isolation of firewall. In order to improve on network security, IPS should satisfy the following conditions:
      ➢    IPS should run on a reliable and stable platform and should be one part of the
      communication link.
      ➢    IPS based network should be supported by special hardware
      ➢    More exact and intelligent are to be employed to enhance the detection ability.
      ➢    IPS should become one part of the network applications, detect attack in real time, isolate intrusion in real time, and protect network actively.
      On the basis of objects IPS protects and methods it uses, IPS is divided into three classes:
      ➢    IPS based host (HIPS)
      ➢    IPS based network (NIPS)
      ➢    Distributed IPS (DIPS)
      Compared with IDS, NIPS has two new features: In-line and traffic isolation. It means IPS is placed in sole path which all traffic of the network detected must pass through, unlike IDS detecting traffic bypassed as shown below in the figure. IPS has suspicious traffic, which is impossible for IDS.

  • CHAPTER TWO -- [Total Page(s) 11]

    Page 5 of 11

    Previous   1 2 3 4 5 6 7 8 9    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTTittle Page    Declaration    Certification    Dedication    Acknowledgements   Abstract    Tables of contents    Table of Content1.0    CHAPTER ONE (INTRODUCTION)1.1    BACKGROUND TO THE WORK    1.2    PROBLEM DEFINITION    1.3    PROJECT JUSTIFICATION    1.4    OBJECTIVES    2.0    CHAPTER TWO (LITERATURE REVIEW)2.1    NETWORK SECURITY    2.2    CHARACTERISTICS OF NETWORK SECURITY   2.3    MAIN THREATS TO NETWORK S ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE1.0    INTRODUCTION1.1    BACKGROUND TO THE WORKThe fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will c ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 8 ]CHAPTER THREE3.0    METHODOLOGY3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHYElliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group.The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation d ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 10 ]Step 3: verifying the signatureAt this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value. ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---