Project Synopsis
Data Compression Techniques
Under the Supervision of Ms. Renu Dalal Submied by:
Gaurav Sharma : 00110102713
Harshvardhan
: 00910102713
Gaurav Singh
: 06410102713
B. Tech. CS !th "ear #mbed$ar %ns&tute of #dvanced Communica&on Technolo'ies ( Research
))S%*U+ ,e- Delhi Abstract Websites & Web Based Applications are prone to security risks. And so are any networks to which web servers are connected. Security is a vital aspect for providing a reliable service on the web. Website security is achieved by a number of network protocols at all tiers, for which encryption and key generation algorithms are essential to protect data integrity and confidentiality in transit. Primarily, we are to develop a loud!deployed web application which will be secured using firewalls, authentication measures, data encryption and intrusion detection systems. Secondly, we will perform penetration testing on the developed web application as part of routine security audit. We will use current vulnerability analytic tools to demonstrate various security features of our Website.
Introduction "ata compression is an integral part of data transmission, storage and processing. We cover different data compression techni#ues, in the lossless and lossy compression categories, with respect to different types of data such as te$t, audio, and video data under specific application circumstances or re#uirements. We introduce the basic theory by Shannon for information encoding, and recent advances in mathematical and algorithmic aspects of data compression. We emphasi%e on application problems and efficient implementation issues. We give an overview of sound, image and frame! based 'P()!*++-, ./*+0+12 and ob3ect!based e.g. 'P()!-2 video coding standards.
Functonal Requiremens
4he proposed Security Algorithms, Protocols and firewall must support the following functions5 A Secured & 6avaScript enabled browser must be used by the users hrome, 7irefo$ etc.2. 8ser must be authenticated using secured private connection with an Anti!bot verification feature. 9ntrusion "etection is the main chain!link to prevent.
4he 9P Address of the user must be verified & monitored for unusual behavior like spoofing, redirecting etc. 4he Website:s 7irewall must reserve some ports on the target system. 9P address will be blacklisted, reports must be sent to both Admin and user & a #uick solution must be availed. Security measures must be taken so that it does not affect the website:s responsiveness, fle$ibility & interaction.
Background 4he following keywords have been fre#uently used in our analysis of the website5 Authentication5 A security measure designed to verify the identity of a transmission, user, user device, entity, or data. ;0< Back Door: idden software or hardware mechanism used to get around security controls. Firewall 5 ardware or software that permits only authori%ed users to enter, and logs attempted intrusions. ;< Malicious Code5 Any type of software capable of performing an unauthori%ed process on an information system. Phishing5 9mpersonating a legitimate entity to illegally ac#uire information via email, phone calls, voicemail, or te$t messaging. Spoofing5 9mpersonating another person or computer, usually by providing a false email name, 8=1, domain name server, or 9P address. Spyware5 Software that collects information without the user:s informed consent. Audit5 A process conducted by #ualified, independent auditors to review and e$amine records and activities to verify compliance with applicable re#uirements resulting in a formal report that could re#uire corrective action. ;< Botnet5 A group of computers that have the same bot installed, that can communicate with and control each other, and are usually used for malicious activities create and send spam email, propagate malicious software, or other cyber!attack2.
echnology !sed 7or "eveloping the Website, 6SP will be used along with the interaction of 6ava Servlets to ensure secured, worm!free environment. 6ava Programming will be used to code the Authentication Algorithms and it will be embedded to a 6ava Server Page 6SP2. 6SP uses 6ava Programming so is easily portable. 9t also offers higher performance than other server side pages like )9, Perl. We will be using several software S>1 9n3ector, 'etasploit, w0af etc.2 and tools pen test!tools etc.2 for penetration testing of our website, checking the strength of its stronghold.
"eferences #$ William Stallings, Cryptography and network security: principles and practices %??/&' Pearson (ducation 9ndia. ($ '.4. "lamini, 6..P. (loff, '.'. (loff, Infor)ation security: he )o*ing target ??@2, omputers & Security ol. , 9ssues 0!-2 +$ 1ori '. Caufman, Data Security in the ,orld of Cloud Co)puting ??@2, 9((( Security & Privacy ol.D, 9ssue -2