Top Banner
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar
22

Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Dec 18, 2015

Download

Documents

Louisa Lewis
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Authored by:

Rachit Rastogi

Computer Science & Engineering Deptt.,

College of Technology,

G.B.P.U.A. & T., Pantnagar

Rachit Rastogi
This Presentation & Research work is carried out by Er. Rachit Kr. Rastogi in Computer Engg. Department,College of Technology, Pantnagar.
Page 2: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Heuristic Antivirus:

1. Content Filtering

2. Sand Boxing

3. Behavior Analysis

It compares all incoming code to a set rule-base(Pattern Matching).

It allows the code to run inside a virtual sandbox(Java Applets).

It allows a system to remain stable while it isolates and stops the malicious code.

Page 3: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Tunneling Viruses

Some anti-virus programs use tunneling techniques to bypass any viruses that might be active in memory when they load.

Tunnel under anti-virus monitoring programs in order to bypass their monitoring functions

Attempts to backtrack down the interrupt chain in order to get DOS and BIOS interrupt handlers

For detection an interception program is in the background looking for specific actions

Page 4: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

About IP Tunneling

Page 5: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

IP Tunneling

PacketPacketEncapsulated

Packet Encapsulated

Packet

Sending EndReceiving End

Tunnel

Page 6: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Virtual Server Implementation

Load Balancer(Deals with outer world) Checked for Destination IP & port Matched for Virtual Service

Choose Real Server Encapsulate packet within an IP Datagram

On receive of the Packet Server process the request

decapsulate the packet send the packet to User

Page 7: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Formation of SSH Tunnel

and

Implementing L2TP & PPTP

Page 8: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

SSH Tunnel : A fat pipe between client and the server host using Port Forwarding, is created when the SSH connection is established.

Forwarding a port through secure SSH tunnel.

Server which uses a SSH connection while communicating with Client using smtp or imap.

Page 9: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

L2TP (Layer two Tunneling Protocol)

L2TP Access Concentrator (LAC): device, which physically

terminates a call.

part, which terminates

and probably authenticates

the PPP stream.

L2TP Network Server (LNS):

Page 10: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Virtual networking connections combined with tunneled cryptographic protections forms a Secure VPN.

Tunneling makes it harder for a router to determine the best route for a packet

Tunneling in VPN was chosen to secure data going across the Internet connections

Page 11: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Key Points allows PPP connections to be tunneled through an IP network

Slow connections and performance or even loss of connectivity on LAN

does not specify special channel algorithms for authentication and encryption

PPTPPPP Conn. -- >IP Network -- > Creates a VPN

Page 12: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Secure Web Tunneling

Page 13: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

All Intranet Web servers can be accessed From the outside in a uniform manner.

URLs are not irreparably mangled, and can be used once the principal returns to the inside of the firewall.

The firewall and the principal that wishes to accessinternal Web resources are mutually authenticated

The firewall can log and audit firewall traversals with a low Administrative overhead

Page 14: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Comparison with IP Tunneling

Page 15: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Secure Corporate Web Tunneling

 * Corporate Network tunneled for securing the incoming/outgoing traffic on Web.

* Users can have Fully Qualified Domain Names apart with Digital Signatures.

* It also accommodate a mix-and-match strategy for areas that may not offer the same technology to the entire VPN community.

customers can use the tunnel endpoint identifiers that make sense for their network, whether they are connecting to devices like routers and firewalls, or users such as remote employees dialing in .

Page 16: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Layers Interfacing sequence

Page 17: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

IntroductionCollectively refers to the techniques, algorithms and ways of tracing code attached to a particular interrupt & then finding the original DOS/BIOS code

* Laser instruments enable many tasks to be carried out by one person

Major points

* All readings and subsequent actions take place at

point of interest rather than at the instrument.

Page 18: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Page 19: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Static Route Tunneling Network

BGP Network

Page 20: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

About the General site surveying

Page 21: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Conclusion

Advantages of Lasers over conventional instruments.

•They can function over Longer Ranges.

• They put the operator at the point being set out rather than at the instrument.

• They enable substantial savings on personnel cost owing to single person operation.

•Several machines can be controlled simultaneously.

•They can be used in areas where poor surface conditions preclude conventional methods.

•Work can be carried out at night.

Page 22: Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

THANK YOU