Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A....
-
Upload
louisa-lewis -
Category
Documents
-
view
220 -
download
2
Transcript of Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A....
Authored by:
Rachit Rastogi
Computer Science & Engineering Deptt.,
College of Technology,
G.B.P.U.A. & T., Pantnagar
Heuristic Antivirus:
1. Content Filtering
2. Sand Boxing
3. Behavior Analysis
It compares all incoming code to a set rule-base(Pattern Matching).
It allows the code to run inside a virtual sandbox(Java Applets).
It allows a system to remain stable while it isolates and stops the malicious code.
Tunneling Viruses
Some anti-virus programs use tunneling techniques to bypass any viruses that might be active in memory when they load.
Tunnel under anti-virus monitoring programs in order to bypass their monitoring functions
Attempts to backtrack down the interrupt chain in order to get DOS and BIOS interrupt handlers
For detection an interception program is in the background looking for specific actions
About IP Tunneling
IP Tunneling
PacketPacketEncapsulated
Packet Encapsulated
Packet
Sending EndReceiving End
Tunnel
Virtual Server Implementation
Load Balancer(Deals with outer world) Checked for Destination IP & port Matched for Virtual Service
Choose Real Server Encapsulate packet within an IP Datagram
On receive of the Packet Server process the request
decapsulate the packet send the packet to User
Formation of SSH Tunnel
and
Implementing L2TP & PPTP
SSH Tunnel : A fat pipe between client and the server host using Port Forwarding, is created when the SSH connection is established.
Forwarding a port through secure SSH tunnel.
Server which uses a SSH connection while communicating with Client using smtp or imap.
L2TP (Layer two Tunneling Protocol)
L2TP Access Concentrator (LAC): device, which physically
terminates a call.
part, which terminates
and probably authenticates
the PPP stream.
L2TP Network Server (LNS):
Virtual networking connections combined with tunneled cryptographic protections forms a Secure VPN.
Tunneling makes it harder for a router to determine the best route for a packet
Tunneling in VPN was chosen to secure data going across the Internet connections
Key Points allows PPP connections to be tunneled through an IP network
Slow connections and performance or even loss of connectivity on LAN
does not specify special channel algorithms for authentication and encryption
PPTPPPP Conn. -- >IP Network -- > Creates a VPN
Secure Web Tunneling
All Intranet Web servers can be accessed From the outside in a uniform manner.
URLs are not irreparably mangled, and can be used once the principal returns to the inside of the firewall.
The firewall and the principal that wishes to accessinternal Web resources are mutually authenticated
The firewall can log and audit firewall traversals with a low Administrative overhead
Comparison with IP Tunneling
Secure Corporate Web Tunneling
* Corporate Network tunneled for securing the incoming/outgoing traffic on Web.
* Users can have Fully Qualified Domain Names apart with Digital Signatures.
* It also accommodate a mix-and-match strategy for areas that may not offer the same technology to the entire VPN community.
customers can use the tunnel endpoint identifiers that make sense for their network, whether they are connecting to devices like routers and firewalls, or users such as remote employees dialing in .
Layers Interfacing sequence
IntroductionCollectively refers to the techniques, algorithms and ways of tracing code attached to a particular interrupt & then finding the original DOS/BIOS code
* Laser instruments enable many tasks to be carried out by one person
Major points
* All readings and subsequent actions take place at
point of interest rather than at the instrument.
Static Route Tunneling Network
BGP Network
About the General site surveying
Conclusion
Advantages of Lasers over conventional instruments.
•They can function over Longer Ranges.
• They put the operator at the point being set out rather than at the instrument.
• They enable substantial savings on personnel cost owing to single person operation.
•Several machines can be controlled simultaneously.
•They can be used in areas where poor surface conditions preclude conventional methods.
•Work can be carried out at night.
THANK YOU