Dissertation Proposal On Detecting & Preventing Major Network Security Threats

Read Complete Research Material

[Dissertation Proposal on Detecting & Preventing Major Network Security Threats]



I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.


I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________


Usually, network security issues are of major concern for all businesses that want to keep the affirmation they are usually dealing with under strict confidentiality. These issues are not very recent, ever since information was transferred among senders and recipients, data transition has been prone to, so as to speak, attacks in order to undermine the protection and to reach out relevant or useful pieces of information. In essence, these attacks are the results of tough competition. Even though network security issues are these days associated with computerized solutions, as a matter of act, this procedure has an impressive background. As long as information has a certain value, it is undeniably prone to attack.

Table of Content

Chapter One: Introduction6


Research Objectives6

Problem Description7

Chapter Two: Literature Review8

Analyse the problem13

Appropriate solution14

Critically Appraisal15

Chapter Three: Research Methodology16

Ethical Consideration16

Chapter Four: Discussion and Recommendation18

Distributed Denial Of Service Attack18


Buffer Overflow20

Network Sniffer21

Ip Spoofing23

Data Spoofing23

Chapter Five: Conclusion24


Chapter One: Introduction


In this thesis we describe model called Diagram of security, which extends existing UML models, specifically Deployment diagram, which is intended for modeling architecture of network systems and it is a model of cooperation between hardware and software components. In our thesis we describe the security requirements of company managers and we suggest methodology of modeling of network systems in terms of security. Diagram of security is comprehensive tool, which will examine network systems to find weaknesses in terms of security and will estimate correct security risk in the deploying or existing network system.

Research Objectives

Assessing the actual state in modeling security the following objectives were defined in the thesis:

- define a model to determine the boundaries of network system and security risk factors of network system,

- create definition of Diagram of security, allowing mathematical and graphical interpretation of the modeled system in terms of network security and will be based on the definition of UML model, namely the Deployment diagram,

- define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements,

- define analysis algorithms to detect vulnerabilities and critical path in terms of security and determine the potential risk of threats of attacks and ability of system to respond,

- implement a basic cost analysis addressing the security policy. The result of the analysis will be to serve as a basis for management decisions and enable risk management to decide on further investments in security features and method of system development.

Problem Description

Designed security model is endowed by real data from various components such as servers, firewalls, workstations and various other components and ...
Related Ads