Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.

Similar presentations


Presentation on theme: "Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar."— Presentation transcript:

1

2 Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar

3 Heuristic Antivirus: 1.Content Filtering 2.Sand Boxing 3.Behavior Analysis It compares all incoming code to a set rule-base(Pattern Matching). It allows the code to run inside a virtual sandbox(Java Applets). It allows a system to remain stable while it isolates and stops the malicious code.

4 Tunneling Viruses Some anti-virus programs use tunneling techniques to bypass any viruses that might be active in memory when they load. Tunnel under anti- virus monitoring programs in order to bypass their monitoring functions Attempts to backtrack down the interrupt chain in order to get DOS and BIOS interrupt handlers For detection an interception program is in the background looking for specific actions

5 About IP Tunneling

6 IP Tunneling Packet Encapsulated Packet Encapsulated Packet Sending End Receiving End Tunnel

7 Virtual Server Implementation Load Balancer(Deals with outer world) Checked for Destination IP & port Matched for Virtual Service Choose Real Server Encapsulate packet within an IP Datagram On receive of the Packet Server process the request decapsulate the packet send the packet to User

8 Formation of SSH Tunnel and Implementing L2TP & PPTP

9 SSH Tunnel : A fat pipe between client and the server host using Port Forwarding, is created when the SSH connection is established. Forwarding a port through secure SSH tunnel. Server which uses a SSH connection while communicating with Client using smtp or imap.

10 L2TP (Layer two Tunneling Protocol) L2TP Access Concentrator (LAC): device, which physically terminates a call. part, which terminates and probably authenticates the PPP stream. L2TP Network Server (LNS):

11 Virtual networking connections combined with tunneled cryptographic protections forms a Secure VPN. Tunneling makes it harder for a router to determine the best route for a packet Tunneling in VPN was chosen to secure data going across the Internet connections

12 Key Points allows PPP connections to be tunneled through an IP network Slow connections and performance or even loss of connectivity on LAN does not specify special channel algorithms for authentication and encryption PPTP PPP Conn. -- >IP Network -- > Creates a VPN

13 Secure Web Tunneling

14 All Intranet Web servers can be accessed From the outside in a uniform manner. URLs are not irreparably mangled, and can be used once the principal returns to the inside of the firewall. The firewall and the principal that wishes to access internal Web resources are mutually authenticated The firewall can log and audit firewall traversals with a low Administrative overhead

15 Comparison with IP Tunneling

16 Secure Corporate Web Tunneling * Corporate Network tunneled for securing the incoming/outgoing traffic on Web. * Users can have Fully Qualified Domain Names apart with Digital Signatures. * It also accommodate a mix-and-match strategy for areas that may not offer the same technology to the entire VPN community. customers can use the tunnel endpoint identifiers that make sense for their network, whether they are connecting to devices like routers and firewalls, or users such as remote employees dialing in.

17 Layers Interfacing sequence

18 Introduction Collectively refers to the techniques, algorithms and ways of tracing code attached to a particular interrupt & then finding the original DOS/BIOS code * Laser instruments enable many tasks to be carried out by one person Major points * All readings and subsequent actions take place at point of interest rather than at the instrument.

19

20 Static Route Tunneling Network BGP Network

21 About the General site surveying

22 Conclusion Advantages of Lasers over conventional instruments. They can function over Longer Ranges. They put the operator at the point being set out rather than at the instrument. They enable substantial savings on personnel cost owing to single person operation. Several machines can be controlled simultaneously. They can be used in areas where poor surface conditions preclude conventional methods. Work can be carried out at night.

23 THANK YOU


Download ppt "Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar."

Similar presentations


Ads by Google