Secure data transmission in network (inside attack)

      

ABSTARCT :

In the present scenario, any type of communication over the internet and other network applications need to be secure due to their increasing utility. For this task, lots of algorithms for security have been implemented and used so far. With these developments, attackers have also come up with the new ideas to penetrate the communication mediums. Till now cryptography has been the mainstay for defending the secure data transmission. With the increasing threat, Steganography has also taken space for security purpose. In cryptography, we change the natural form of data by using different security algorithms, which leads to increasing security of the communication process. In Steganography information is kept hidden from the attacker for communicating the information safely with the use of images, audios, videos etc. So for more security during data transmission, we have proposed the method of using both the techniques cryptography, and steganography. In cryptography we will perform three level encryption with the use of AES, DES and Blowfish algorithms. In steganography, we will be embedding the data file in any audio, video or image with the use of LSB, DWT and DCT technique and then we will communicate the secure data to the receiver end.

EXISTING SYSTEM :

? These vulnerabilities exist in the examination of encrypted packets as they pass through the infrastructure. ? But generally speaking, the debate exists because of the sheer quantity of data being passed. ? The argument exists not only about the relevance of data, but also how long the data is meaningful as compared to how long it might take to decipher. ? While this is a simplistic example, it should be considered that with powerful computing capabilities that exist today, vulnerabilities in even extremely complex key material could easily be exploited.

DISADVANTAGE :

? The objective of our proposed work is to find an alternative to the problem faced by the different organization, companies and people for transmitting their critical and important data. ? The communication problem in computer networks can be defined as the task of transferring data entered by an application user in one system to an application user in another system through one or more intermediate networks. ? The communication problem is solved using a layered approach through a collection of protocols forming the so-called protocol suite. ? Each layer, dealing with a particular aspect of the communication problem, is implemented with a particular protocol and the protocols co-operate with each other to solve the entire communication problem.

PROPOSED SYSTEM :

• More security during data transmission, we have proposed the method of using both the techniques cryptography, and steganography. • In Asymmetric encryption and decryption process, both the sender end and receiver end use the different key and this proposes the concept of using public and private key in encryption and decryption phenomenon in the communication process. • The key point of our proposed work is that we can encrypt the data file in any of the desired order. • With the increasing threat, Steganography has also taken space for security purpose.

ADVANTAGE :

? As the attacker injects more and more data packets, the size of the ACK storm increases and can quickly bring down performance of the network. ? Chargen (Character Generator) is a protocol of the TCP/IP protocol stack and is used for testing and performance measurement purposes. ? The firewall is often a kind of bottleneck for network performance. ? The structure and transmission of the frames depends on the topology and hardware technology (like Ethernet, Token Ring and etc) used for the network. ? The process of wiretapping differs depending on the communication medium used.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp