Tuesday, August 31, 2010

Seminar report on "Body Area Network (BAN)"

A Body Area Network is formally defined by IEEE 802.15 as, "a communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve a variety of applications including medical,
consumer electronics / personal entertainment and other" [IEEE 802.15]. In more common terms, a Body Area Network is a system of devices in close proximity to a persons body that cooperate for the benefit of the user. This paper discusses several uses of the BAN technology As IEEE mentioned, the most obvious application of a BAN is in the medical sector, however there are also more recreational uses to BANs. This paper will discuss the technologies surrounding BANs, as well as several common applications for BANs. At the end of the paper we will briefly discuss the challenges associated with BANs and some solutions that are on the horizon.

BAN technology is still an emerging technology, and as such it has a very short history.
BAN technology emerges as the natural byproduct of existing sensor network technology
and biomedical engineering. Professor Guang-Zhong Yang was the first person to
formally define the phrase "Body Sensor Network" (BSN) with publication of his book
Body Sensor Networks in 2006. BSN technology represents the lower bound of power
and bandwidth from the BAN use case scenarios. However, BAN technology is quite
flexible and there are many potential uses for BAN technology in addition to BSNs.

  Download :     Reports & Presentation (.zip)

Seminar report on "Intelligent Voice Response System (IVRS)"

  In today’s competitive world any business must build flexible systems that adapt easily to evolving requirements of the critical business processes. IVRS is one such system that
transforms the traditional business model into customer centric model. IVRS is historically interactive speech memory driven that walk the caller through a series of prompts where they respond to questions by pressing the combination of one or more buttons of the phone keypad.
The decision tree associated with the prompts and the responses will route the caller to information they desire. These IVRS systems are typically utilized to check bank account balance, buy and sell stocks, check the show times for your favorite movie. In telephony, Intelligent Voice Response, or IVR, is a phone technology that allows a computer to detect voice and touch tones using a normal phone call. The IVR system can respond with pre-recorded or dynamically generated audio to further direct callers on how to proceed. IVR systems can be used to control almost any function where the interface can be broken down into a series of simple menu choices. Once constructed IVR systems generally scale well to handle large call volumes.


  Download :     Full Report (.pdf)

Seminar report on "Web Spoofing"

 The Web is currently the pre-eminent medium for electronic service delivery to remote users. As a consequence, authentication of servers is more important than ever. Even sophisticated users base their decision whether or not to trust a site on browser cues—such as location bar information, SSL icons, SSL warnings, certificate information, response time, etc.
In the seminal work on web spoofing, Felten et al showed how a malicious server could forge some of these cues—but using approaches that are no longer reproducible. However, subsequent evolution of Web tools has not only patched security holes—it has also added new
technology to make pages more interactive and vivid. In this paper, we explore the feasibility of
web spoofing using this new technology—and we show how, in many cases, every one of the
above cues can be forged.

Nearly every aspect of social, government, and commercial activity is moving into electronic
settings. TheWorldWideWeb is the de facto standard medium for these services. Inherent
properties of the physical world make it sufficiently difficult to forge a convincing storefront or
ATM that successful attacks create long-cited anecdotes . As a consequence, users of physical
services—stores, banks, newspapers—have developed a reasonably effective intuition of when to trust that a particular service offering is exactly what it appears to be. However, moving from
“bricks and mortar” to electronic introduces a fundamental new problem: bits are malleable.
Does this intuition still suffice for the new electronic world? When one clicks on a link that says“Click Here to go to TrustedStore.Com,” how does one know that’s where one has been taken?
Answering these questions require examining how users make judgments about whether
to trust a particular Web page for a particular service. Indeed, the issue of user trust judgment is largely overlooked; research addressing how to secure Web servers, how to secure the client-server connection, and how to secure client-side management risk being rendered moot, if the final transmission of trust information the human user is neglected.


  Download :     Full Report (.pdf)

Secured Data Transmission using Cryptographic and Steganographic Techniques

 ‘The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.’

- The art of war, Sun Tzu

As we enter the age of universal electronic connectivity, electronic eavesdropping and electronic fraud threaten the prosperity of corporations and individuals. Thus, the role of digital security has become increasingly important. The security requirements within an organization have undergone major changes in the last few decades. Before the widespread use of data processing equipment, data and information valuable to an organization were made invulnerable primarily by physical and administrative means. With the advent of computer networks and the internet however, the design of automated tools which ensure security and privacy of information transferred across networks was inevitable. Though there are several security techniques in use, two of the most prominent ones are steganography and cryptography. In this paper , we discuss these two techniques and how their combination can result in an efficient and secure data transfer software.

  Download :     Full Report (.doc)

Seminar report on "Blue Tooth"

 Bluetooth wireless technology is a cable replacement technology that provides wireless communication between portable devices, desktop devices and peripherals. It is used to swap data and synchronize files between devices without having to connect each other with cable. The wireless link has a range of 10m which offers the user mobility. This technology can be used to make wireless data connection to conventional local area networks (LAN) through an access point. There is no need for the user to open an application or press button to initiate a process. Bluetooth wireless technology is always on and runs in the background. Bluetooth devices scan for other Bluetooth devices and when these devices are in range they start to exchange messages so they can become aware of each others capabilities. These devices do not require a line of sight to transmit data with each other. Within a few years about 80 percent of the mobile phones are expected to carry the Bluetooth chip. The Bluetooth transceiver operates in the globally available unlicensed ISM radio band of 2.4GHz. The ISM bands include frequency range at 902MHz to 928MHz and 2.4GHz to 2.484GHZ which do not require operator license from a regulatory agency. This means that Bluetooth technology can be used virtually anywhere in the world. Another type of wireless technology that is being used nowadays is infrared signals. The choice of using either one of the wireless technology will depend on the application for which it is being used. Bluetooth is an economical, wireless solution that is convenient, reliable, easy to use and operates over a longer distance than infrared. The initial development started in 1994 by Ericsson. Bluetooth now has a special interest group (SIG) which has 1800 companies worldwide. Bluetooth technology enables voice and data transmission in a short-range radio. There is a wide range of devises which can be connected easily and quickly without the need for cables. Soon people world over will enjoy the convenience, speed and security of instant wireless connection. Bluetooth is expected to be embedded in hundreds of millions mobile phones, PCs, laptops and a whole range of other electronic devices in the next few years. This is mainly because of the elimination of cables and this makes the work environment look and feel comfortable and inviting. 

   Download :     Full Report (.doc)

Seminar report on "Cluster Computing"

The recent advances in high-speed networks and improved microprocessor performance are making clusters or networks of workstations an appealing vehicle for cost effective parallel computing. Clusters built using commodity hardware and software components are playing a major role in redefining the concept of supercomputing.A cluster is a type of parallel or distributed processing system, which consists of a collection of interconnected stand-alone computers cooperatively working together as a single, integrated computing resource.
This cluster of computers shares common network characteristics like the same namespace and it is available to other computers on the network as a single resource. These computers are linked together using high-speed network interfaces between themselves and the actual binding together of the all the individual computers in the cluster is performed by the operating system and the software used.

   Download :     Full Report (.doc)

Seminar report on "HP Java"

  HPJava is a programming language extended from Java to support parallel programming, especially (but not exclusively) data parallel programming on message passing and distributed memory systems, from multi-processor systems to workstation clusters. 

Although it has a close relationship with HPF, the design of HPJava does not inherit the HPF programming model. Instead the language introduces a high-level structured SPMD programming style--the HPspmd model. A program written in this kind of language explicitly coordinates well-defined process groups. These cooperate in a loosely synchronous manner, sharing logical threads of control. As in a conventional distributed-memory SPMD program, only a process owning a data item such as an array element is allowed to access the item directly. The language provides special constructs that allow programmers to meet this constraint conveniently. 

Besides the normal variables of the sequential base language, the language model introduces classes of global variables that are stored collectively across process groups. Primarily, these are distributed arrays. They provide a global name space in the form of globally subscripted arrays, with assorted distribution patterns. This helps to relieve programmers of error-prone activities such as the local-to-global, global-to-local subscript translations which occur in data parallel applications. 



   Download :     Full Report (.doc)

Seminar report on "Computer Forensics"

                    Computer forensics is simply the application of disciplined investigative techniques in the automated environment and the search, discovery, and analysis of potential evidence. It is the method used to investigate and analyze data maintained on or retrieved from electronic data storage media for the purposes of presentation in a court of law, civil or administrative proceeding. Evidence may be sought in a wide range of computer crime or misuse cases.

Computer forensics is rapidly becoming a science recognized on a par with other forensic sciences by the legal and law enforcement communities. As this trend continues, it will become even more important to handle and examine computer evidence properly. Not every department or organization has the resources to have trained computer forensic specialists on staff.


   Download :     Full Report (.doc)

Seminar report on "Computer Forensics"

                    Computer forensics is simply the application of disciplined investigative techniques in the automated environment and the search, discovery, and analysis of potential evidence. It is the method used to investigate and analyze data maintained on or retrieved from electronic data storage media for the purposes of presentation in a court of law, civil or administrative proceeding. Evidence may be sought in a wide range of computer crime or misuse cases.

Computer forensics is rapidly becoming a science recognized on a par with other forensic sciences by the legal and law enforcement communities. As this trend continues, it will become even more important to handle and examine computer evidence properly. Not every department or organization has the resources to have trained computer forensic specialists on staff.


   Download :     Full Report (.doc)

Seminar report on "Biometric Technology"


                           BIOMETRICS refers to the automatic identification of a person based on his physiological / behavioral characteristics. This method of identification is preferred for various reasons;the person to be identified is required to be physically present at the point of identification; identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased use of computers or vehicles of information technology, it is necessary to restrict access to sensitive or personal data. By replacing PINs, biometric techniques can potentially prevent unauthorized access to fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. PINs and passwords may be forgotten, and token based methods of identification like passports and driver’s licenses may be forged, stolen, or lost .Thus biometric systems of identification are enjoying a renewed interest. Various types of biometric systems are being used for real–time identification ; the most popular are based on face recognition and fingerprint matching. However there are other biometric systems that utilize iris and retinal scan, speech, facial thermo grams, and hand geometry.
A biometric system is essentially a pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristics possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending on the context, a biometric system can be either a verification (authentication) system or an identification system. There are two different ways to resolve a person’s identity : Verification and Identification. Verification ( Am I whom I claim I am ?) involves confirming or denying a person’s claimed identity. In Identification one has to establish a person’s identity (whom am I?). Each one of these approaches has its own complexities and could probably be solved best by a certain biometric system.
Biometrics is rapidly evolving technology, which is being used in forensics such as criminal identification and prison security, and has the potential to be used in a large range of civilian application areas . Biometrics can be used transactions conducted via telephone and Internet (electronic commerce and electronic banking) . In automobiles, biometrics can replace keys with key -less entry devices. 


   Download :     Full Report (.doc)

Seminar report on "Brain Chips"

Computer scientists predict that within the next twenty years neural interfaces will be designed that will not only increase the dynamic range of senses, but will also enhance memory and enable "cyberthink" — invisible communication with others. This technology will facilitate consistent and constant access to information when and where it is needed.
               The ethical evaluation in this paper focuses on issues of safety and informed consent, issues of manufacturing and scientific responsibility, anxieties about the psychological impacts of enhancing human nature, worries about possible usage in children, and most troubling, issues of privacy and autonomy.
            In as much as this technology is fraught with perilous implications for radically changing human nature, for invasions of privacy and for governmental control of individuals, public discussion of its benefits and burdens should be initiated, and policy decisions should be made as to whether its development should be proscribed or regulated, rather than left to happenstance, experts and the vagaries of the commercial market.
             Brain chips are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes. It is likely that implantable computer chips acting as sensors, or actuators, may soon assist not only failing memory, but even bestow fluency in a new language, or enable "recognition" of previously unmet individuals. The progress already made in therapeutic devices, in prosthetics and in computer science indicates that it may well be feasible to develop direct interfaces between the brain and computers.
          This technology is only under developmental phase, although many implants have already been made on the human brain for experimental purposes. Let’s take a look at this developing technology. 

   Download :     Full Report (.doc)

Seminar report on "Holographic Memory"

Devices that use light to store and read data have been the backbone of data storage for nearly two decades. Compact discs revolutionized data storage in the early 1980s, allowing multi-megabytes of data to be stored on a disc that has a diameter of a mere 12 centimeters and a thickness of about 1.2 millimeters. In 1997, an improved version of the CD, called a digital versatile disc (DVD), was released, which enabled the storage of full-length movies on a single disc. 
                         Holographic memory is developing technology that has promised to revolutionalise the storage systems. It can store data upto 1 Tb in a sugar cube sized crystal. Data from more than 1000 CDs can fit into a holographic memory System. Most of the computer hard drives available today can hold only 10 to 40 GB of data, a small fraction of what holographic memory system can hold. Conventional memories use only the surface to store the data. But holographic data storage systems use the volume to store data. It has more advantages than conventional storage systems. It is based on the principle of holography. 
Scientist Pieter J. van Heerden first proposed the idea of holographic (three-dimensional) storage in the early 1960s. A decade later, scientists at RCA Laboratories demonstrated the technology by recording 500 holograms in an iron-doped lithium-niobate crystal and 550 holograms of high-resolution images in a light-sensitive polymer material. The lack of cheap parts and the advancement of magnetic and semiconductor memories placed the development of holographic data storage on hold. 
                         A hologram is a block or sheet of photosensitive material which records the interference of two light sources. To create a hologram, laser light is first split into two beams, a source beam and a reference beam. The source beam is then manipulated and sent into the photosensitive material. Once inside this material, it intersects the reference beam and the resulting interference of laser light is recorded on the photosensitive material, resulting in a hologram. Once a hologram is recorded, it can be viewed with only the reference beam. The reference beam is projected into the hologram at the exact angle it was projected during recording. When this light hits the recorded diffraction pattern, the source beam is regenerated out of the refracted light. An exact copy of the source beam is sent out of the hologram and can be read by optical sensors. For example, a hologram that can be obtained from a toy store illustrates this idea. Precise laser equipment is used at the factory to create the hologram. A recording material which can recreate recorded images out of natural light is used so the consumer does not need high-tech equipment to view the information stored in the hologram. Natural light becomes the reference beam and human eyes become the optical sensors. 



   Download :     Full Report (.doc)

Seminar report on "Autonomic Computing"

“Autonomic Computing” is a new vision of computing initiated by IBM. This new paradigm shifts the fundamental definition of the technology age from one of computing, to one defined by data. Access to data from multiple, distributed sources, in addition to traditional centralized storage devices will allow users to transparently access information when and where they need it. At the same time, this new view of computing will necessitate changing the industry's focus on processing speed and storage to one of developing distributed networks that are largely self-managing, self-diagnostic, and transparent to the user. 
The term autonomic is derived from human biology. The autonomic nervous system monitors our heartbeat, checks our blood sugar level and keeps our body temperature close to 98.6 °F, without any conscious effort on our part. In much the same way, autonomic computing components anticipate computer system needs and resolve problems —with minimal human intervention. However, there is an important distinction between autonomic activity in the human body and autonomic responses in computer systems. Many of the decisions made by autonomic elements in the body are involuntary, whereas autonomic elements in computer systems make decisions based on tasks you choose to delegate to the technology. In other words, adaptable policy — rather than rigid hard coding determines the types of decisions and actions autonomic elements make in computer systems. 


   Download :     Full Report (.doc)

Seminar report on "Brain-Computer Interface"

A brain–computer interface (BCI), sometimes called a direct neural interface or a brain–machine interface, is a direct communication pathway between a brain and an external device. BCIs are often aimed at assisting, augmenting or repairing human cognitive or sensory-motor functions.

Research on BCIs began in the 1970s at the University of California Los Angeles (UCLA) under a grant from the National Science Foundation, followed by a contract from DARPA. The papers published after this research also mark the first appearance of the expression brain–computer interface in scientific literature.

The field of BCI has since blossomed spectacularly, mostly toward neuroprosthetics applications that aim at restoring damaged hearing, sight and movement. Thanks to the remarkable cortical plasticity of the brain, signals from implanted prostheses can, after adaptation, be handled by the brain like natural sensor or effector channels. Following years of animal experimentation, the first neuroprosthetic devices implanted in humans appeared in the mid-nineties.

   Download :     Full Report (.doc)

Saturday, August 28, 2010

Seminar report on "Biometric Voting system"

It has always been an arduous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world. Crores of rupees have been spent on this to make sure that the elections are riot free. But, now- a -days it has become common for some forces to indulge in rigging which may eventually lead to a result contrary to the actual verdict given by the people.This paper aims to present a new voting system employing biometrics in order to avoid rigging and to enhance the accuracy and speed of the process. The system uses thumb impression for voter identification as we know that the thumb impression of every human being has a unique pattern. Thus it would have an edge over the present day voting systems.

As a pre-poll procedure, a database consisting of the thumb impressions of all the eligible voters in a constituency is created. During elections, the thumb impression of a voter is entered as input to the system. This is then compared with the available records in the database. If the particular pattern matches with any one in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected. Also the police station nearby to the election poll booth is informed about the identity of the imposter. All the voting machines are connected in a network, through which data transfer takes place to the main host. The result is instantaneous and counting is done finally at the main host itself. The overall cost for conducting elections gets reduced and so does the maintenance cost of the systems.


   Download :     Full Report (.doc)

Friday, August 27, 2010

Seminar report on "Paper Battery"

A paper battery is a flexible, ultra-thin energy storage and production device formed by combining carbon nanotube s with a conventional sheet of cellulose-based paper. A paper battery acts as both a high-energy battery and supercapacitor , combining two components that are separate in traditional electronics . This combination allows the battery to provide both long-term, steady power production and bursts of energy. Non-toxic, flexible paper batteries have the potential to power the next generation of electronics, medical devices and hybrid vehicles, allowing for radical new designs and medical technologies.
Paper batteries may be folded, cut or otherwise shaped for different applications without any loss of integrity or efficiency . 
Cutting one in half halves its energy production. Stacking them multiplies power output. Early prototypes of the device are able to produce 2.5 volt s of electricity from a sample the size of a postage stamp.
The devices are formed by combining cellulose with an infusion of aligned carbon nanotubes that are each approximately one millionth of a centimeter thick. The carbon is what gives the batteries their black color. These tiny filaments act like the electrode s found in a traditional battery, conducting electricity when the paper comes into contact with an ionic liquid solution. Ionic liquids contain no water, which means that there is nothing to freeze or evaporate in extreme environmental conditions. As a result, paper batteries can function between -75 and 150 degrees Celsius.


  Download :     Full Report (.doc)

Seminar report on "Wireless Energy Transfer using Magnetic Resonance"

In 1899, Nikola Tesla, who had devised a type of resonant transformer called the Tesla coil, achieved a major breakthrough in his work by transmitting 100 million volts of electric power wirelessly over a distance of 26 miles to light up a bank of 200 light bulbs and run one electric motor. Tesla claimed to have achieved 95% efficiency, but the technology had
to be shelved because the effects of transmitting such high voltages in electric arcs would have been disastrous to humans and 
electrical equipment in the vicinity. This technology has been languishing in obscurity for a number of years, but the advent of portable devices such as mobiles, laptops, smartphones, MP3 players, etc warrants another look at the technology.
We propose the use of a new technology, based on strongly coupled magnetic resonance. It
consists of a transmitter, a current carrying copper coil, which acts as an electromagnetic resonator and a receiver, another copper coil of similar dimensions to which the device to be powered is attached. The transmitter emits a non-radiative magnetic field resonating at MHz frequencies, and the receiving unit resonates in that field. The resonant nature of the
process ensures a strong interaction between the sending and receiving unit, while interaction with rest of the environment is weak.


  Download :     Full Report (.pdf)

Seminar report on "Universal Mobile Telecommunications System (UMTS)"



The Universal Mobile Telecommunications System (UMTS) is a third generation (3G) mobile communications system that provides a range of broadband services to the world of wireless and mobile communications. This chapter presents an overview of the UMTS
architecture specified by the Third Generation Partnership Project (3GPP), focusing on the
network elements relevant to the study presented here. The evolution towards an All-IPnetwork, within the 3GPP, is occurring in several steps, known as releases [6, 7]. Earlier UMTS specifications, with a relatively strong retention of the current 2nd generation networks, were still switch centric. However, the introduction of a new IP platform, when fully specified, will provide the UMTS system with multiple wireless access options and full IP packet support.

The first version of the UMTS Specification, 3GPP Release 99, defines a system which
adopts much of the functionalities of the GSM/GPRS core network and introduces a new
wireless access technology, namely wideband code division multiple access (WCDMA).
This access technology increases the 2G systems capacity to higher data rates enabling the
support of advanced services. 3GPP Release 4, further optimizes the air interface, although
the major changes are targeted at the core network circuit switched domain, still present in
order to maintain full coverage for second-generation services. These changes result in the
separation of user data flows and their control systems into different physical entities, the
Mobile-services Switching Centre (MSC) and the Media Gateway (MGW) respectively.
Finally Release 5/6 provides a migration from conventional Circuit-Switched speech
services served by CS domain to enhanced IP-based services using a Packet-Switched domain.

  Download :     Full Report (.pdf)     Presentation (.ppt)

Sunday, August 15, 2010

Google SSL Search (Googles new encrypted search technique)

Features: SSL Search

With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.
To use search over SSL, visit https://encrypted.google.com New window icon each time you perform a search. Note that only Google web search is available over SSL, so other search products like Google Images and Google Maps are not currently available over SSL. When you're searching over SSL, these properties may not appear in the left panel.

What is SSL?

SSL (Secure Sockets Layer) is a protocol that helps provide secure Internet communications for services like web browsing, e-mail, instant messaging, and other data transfers. When you search over SSL, your search queries and search traffic are encrypted so they can't be read by any intermediary party such as employers and internet service providers (ISPs).

What can I expect from search over SSL?

Here's how searching over SSL is different from regular Google search:
  • SSL encrypts the communication channel between Google and a searcher's computer. When search traffic is encrypted, it can't be read by third parties trying to access the connection between a searcher's computer and Google's servers. Note that the SSL protocol does have some limitations — more details are below.
  • As another layer of privacy, SSL search turns off a browser's referrers New window icon. Web browsers typically turn off referrers when going from HTTPS to HTTP mode to provide extra privacy. By clicking on a search result that takes you to an HTTP site, you could disable any customizations that the website provides based on the referrer information.
  • At this time, search over SSL is supported only on Google web search. We will continue to work to support other products like Images and Maps. All features that are not supported have been removed from the left panel and the row of links at the top. You'll continue to see integrated results like images and maps, and clicking those results will take you out of encrypted search mode.
  • Your Google experience using SSL search might be slightly slower than you're used to because your computer needs to first establish a secure connection with Google.
Note that SSL search does not reduce the data that Google receives and logs when you search, or change the listing of these terms in your Web History New window icon.
Information for school network administrators

Does SSL provide complete security?

While SSL helps prevent intermediary parties, such as ISPs, from knowing the exact search that you typed, they could still know which websites you visit once you click on the search results. For example, when you search over SSL for [ flowers ], Google encrypts the query "flowers" and the results that Google returns. But when you click on a search result, including results like images and maps, you could be exiting the encrypted mode if the destination link is not on https://.If your computer is infected with malware or a keylogger, a third party might still be able to see the queries that you typed. We recommend that everyone learns how to prevent and remove malware.
Remember that only Google web search supports search over SSL, so searching Google Images, for example, will not be encrypted.
Technical discussion of SSL protocol-level limitations

How can I confirm whether I'm on a secure connection?

Check to see that the URL you're on starts with https:// instead of http://. Most browsers provide a visual confirmation (such as an icon of a lock) in the address bar or in the status bar at the bottom of the page. On Google SSL search, you'll also see a special Google SSL logo with a lock icon. In addition to this logo, be sure to also check the https:// text in the address bar and any browser lock icons.
When you perform a search on https://encrypted.google.com New window icon, you might see a warning if a page has some non-secure components: depending on your browser settings, you might see the lock icon turn into a warning sign, a pop-up message, or some other form of alert. This issue is often referred to as a "mixed mode error."
Since this is a beta feature, there might be some rare cases in search over SSL that generate a mixed mode error. We're working to prevent such errors, and you can help if you report any errors New window iconthrough our Help Forum.

Wednesday, August 11, 2010

Seminar report on "Embedded Auditors for Intrusion Detection"


A basic cornerstone of security is to verify the integrity of fundamental data stored in the system. This integrity checking is being achieved using integrity tools such Tripwire, which depend on the integrity and proper operation of the operating system, i.e. these applications assume that the operating system always operates correctly. When this assumption is not valid, the integrity applications cannot provide a reliable result, and consequently may provide a false negative. Once the operating system is compromised, a novice attacker, using tools widely available on the Internet (rootshell.com, etc), could easily defeat integrity tools that rely on the operating system.
A novel way to overcome this traditional integrity problem is to use an independent auditor. The independent auditor uses an out-of-band verification process that does not depend on the underlying operating system. The resultant system provides extremely strong integrity guarantees, detecting modifications to approved objects as well as detecting the existence of unapproved and thus unsigned objects. This is accomplished without any modifications to the host operating system. StrongARM EBSA-285 Evaluation Board, with a SA-110 microprocessor and 21285 core logic can be used as auditors.
These snippets from Web resource, please do read whole report for more information.
Book: Intrusion Detection by Rebecca Gurley Bace
Web resources: Using Independent Auditors as Intrusion Detection Systems
DOWNLOAD Power Point Presentation (PPT): IDSIC: A Modeling of Intrusion Detection System with Identification Capability