INTERNET

Saturday, March 8, 2008

REPORT 3


Intrusion Detection

Reducing Network Security Risk


1. INTRODUCTION

1.1 Security Concerns

Despite nearly universal efforts to protect corporate networks, today’s distributed organizations are still susceptible to a multitude of attacks. IT executives are challenged to extend security beyond the corporate backbone to protect a variety of potential vulnerabilities, including Internet connections, communication channels between remote and corporate offices and links between trusted business partners. Unfortunately, the preventive measures employed to secure corporate resources and internal traffic don’t provide the breadth or depth of analysis needed to identify attempted attacks or uncover potential threats across the organization.

1.2 Network Security Management

Security is the process of staying informed. The goals of security include Confidentiality (ensuring only authorized users can read or copy a given file or object), Control (only authorized users can decide when to allow access to information), Integrity (only authorized users can alter or delete a given file or object), Authenticity (correctness of attribution or description), Availability (no unauthorized user can deny authorized users timely access to files or other system resources), and Utility (fitness for a specified purpose).

Network Security Management is a process in which one establishes and maintains policies, procedures, and practices required for protecting networked information system assets. The various tools & steps used today for maintaining corporate network security are indicated

FOR MORE CONTACT US E-mail: shreeyash.2020@gmail.com

REPORT 2


IP TELEPHONY


Internet Telephony is the latest technology that dazzles both the datacom and the telecom industries. Consumers got excited by the prospect of using a PC and an Internet connection to dial up friends anywhere in the world and talk for hours without ringing up long distances. This is what IP Telephony is!

IP Telephony technology has rapidly enabled the convergence of voice and data networks- launching us in the next generation of communication services.

This report discusses the development challenges and basic system components to implement IP Telephony technology.

In March of 1996, VocalTec announced it was working with an Intel Company (Dialogic Corporation, an Intel acquisition made in 1999) to produce the first IP telephony gateway.

Gateways are the key to bringing IP telephony into the mainstream. By bridging the traditional circuit-switched telephony world with the Internet, gateways offer the advantages of IP telephony to the most common, cheapest, most mobile, and easiest-to-use terminal in the world: the standard telephone.


FOR MORE CONTACT US E-mail: shreeyash.2020@gmail.com

REPORT 1

DATA MINING
USING

NEURAL NETWORKS

1. DATA MINING

1.1 Introduction

The past two decades has seen a dramatic increase in the amount of information or data being stored in electronic format. This accumulation of data has taken place at an explosive rate. It has been estimated that the amount of information in the world doubles every 20 months and the size and number of databases are increasing even faster. The increase in use of electronic data gathering devices such as point-of-sale or remote sensing devices has contributed to this explosion of available data. The problem of effectively utilizing these massive volumes of data is becoming a major problem for all enterprises.

Data storage became easier as the availability of large amounts of computing power at low cost ie the cost of processing power and storage is falling, made data cheap. There was also the introduction of new machine learning methods for knowledge representation based on logic programming etc. in addition to traditional statistical analysis of data. The new methods tend to be computationally intensive hence a demand for more processing power.

It was recognized that information is at the heart of business operations and that decision-makers could make use of the data stored to gain valuable insight into the business. Database Management systems gave access to the data stored but this was only a small part of what could be gained from the data. Traditional on-line transaction processing systems, OLTPs, are good at putting data into databases quickly, safely and efficiently but are not good at delivering meaningful analysis in return. Analyzing data can provide further knowledge about a business by going beyond the data explicitly stored to derive knowledge about the business. This is where Data Mining has obvious benefits for any enterprise.

1.2 What is Data Mining?

1.2.1 Definition

Researchers William J Frawley, Gregory Piatetsky-Shapiro and Christopher J Matheus have defined Data Mining as:

Data mining is the search for relationships and global patterns that exist in large databases but are `hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent valuable knowledge about the database and the objects in the database and, if the database is a faithful mirror, of the real world registered by the database.

The analogy with the mining process is described as:

Data mining refers to "using a variety of techniques to identify nuggets of information or decision-making knowledge in bodies of data, and extracting these in such a way that they can be put to use in the areas such as decision support, prediction, forecasting and estimation. The data is often voluminous, but as it stands of low value as no direct use can be made of it; it is the hidden information in the data that is useful", Clementine User Guide, a data mining toolkit.

FOR MORE CONTACT US E-mail: shreeyash.2020@gmail.com