Projects and Reports

Network programming assignment topics

This section of the website contains topics for network programming assignment. Scripts are developed using Python with additional frameworks.

TCP Syn Sender

A TCP packet sender developed with Python which sends custom TCP SYN Packets.

Mac Spoofer

A script developed with Python which sends packets with custom mac-address.

UDP Packet Injector

A UDP packet sender developed with Python which sends custom UDP Packets.

IP Scanner Tool

Script developed with Python which scans the list of IP address on the network.

Lan Speed Testing Tool

Script developed with Python which tests the speed of a LAN network.

Mac Finder Tool

Script developed with Python which finds the mac-address of a device based on IP address.

The source code for the above tools and scripts is included as part of the course Network Testing Course

Network Security assignment Topics

This section of the website contains network security assignment topics. The assignment title along with description is provided which can be used for research activity.

Secure network design with DMZ (Demilitarized Zone)

Understands the concept of Demilitarized zone in a network environment and the mechanism and network design strategy by which a server which is exposed to the internet can be setup in DMZ zone for access by users on the internet and the LAN.

Comparative study of Network and application layer firewalls

A comparative study on network and application layers firewalls, deployment strategies, the limitations and improvements, and the typical attacks which are blocked using the firewalls.

Database attacks and defense

Understands the different types of attacks which are targeted on a database infrastructure, like network sniffing, weak passwords, sql injection, brute force attacks etc. The anatomy of the attacks and the defense mechanism for each of the attacks is identified.

MITM vulnerable protocols and mitigation

Understands the anatomy of a Man in the middle attack and the anatomy. The different protocols which are vulnerable to the attack like, TCP, ARP etc and real time environments where the attacks are used are analyzed.

Comparative study of Firewalls, IDS and IPS

A comparative study on firewalls, IDS and IPS. The deployment scenarios, attacks which are defended by the devices, limitations and improvements are understood. The different vendors and modes of the devices are researched and documented.

Wireless migration from WEP to WPA

Understands the limitation and security issues with the WEP protocol and the improvements with WPA protocol. The different components which are required to setup WPA based wireless infrastructure like supplicants, WPA supported access points are understood

Cisco automation framework

The Cisco automation framework project develops a framework of scripts with TCL and Expect for automating configurations on Cisco routers and switches for network administration and testing activity. Basics of TCL and expect is understood prior to the development of the framework. The following scripts are available in the framework.

1. Script to automate telnet connectivity to Cisco router
2. Script to automate telnet connectivity to Cisco switch
3. Script to automate the process of printing the shown run command on a Cisco router
4. Script to search for a specific pattern in the output returned from a Cisco show command.
5. Script to automate the process of configuring RIP entry for a specific network address on a Cisco router.
6. Script to automate the process of configuring 100 RIP entries on a Cisco router
7. Script to automate the process of creating a VLAN on a Cisco switch
8. Script to create 30 VLAN’S on a Cisco switch

The framework is available as a downloadable ebook. Contents and title are provided below.

Ebook Title – Network Test automation using TCL and Expect

Ebook Contents

What is TCL
TCL Setup procedure
What is Expect
Expect Setup procedure
Understanding the need for TCL and Expect
TCL and Expect Basics
Creating a TCL File
Import expect into a TCL file
Executing the TCL file
TCL essential for network automation
Regular expressions
EXPECT essentials for network test automation
Expect commands
Expect Buffers
Source Code of the above mentioned scripts

Ebook format – PDF

No of Pages – 26

Price – 9.99

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The Ebook would be downloaded automatically and you would also receive the download link in the email used for payment.

Buy from Amazon

Network Security Case Study

This section contains network security case study topics.

Title: IPSEC issues with NAT firewalls and IP Fragments with mitigation.

The case study does a detailed study on IPSEC and its different modes like transport and tunnel mode. IPSEC issues with NAT firewalls and IP fragmented packets and the different mitigation techniques which are available are understood.

Title: Eavesdropping vulnerable protocols and associated mitigation

The case study does a study on eavesdropping and the techniques used by the attacker like sniffing to perform the attack and the common protocols like telnet, http etc which are susceptible to the attack. How improved protocols like SSH, HTTPS can be used to prevent the attacks are understood.

Title: Attacks on a switching infrastructure and mitigation

The case study does a study on different types of attacks which are targeted on a switch infrastructure like cam flooding, ARP cache poisoning, STP and VLAN based attacks are understood. The anatomy of the attacks and different security features which are available on the switch which can be configured to mitigation the attacks are analyzed.

Title: DDOS based attacks on TCP and ICMP

The case study does a study on the anatomy of a DDOS attack and how it differs from a DOS attack. DDOS attacks which are based on TCP and ICMP, how they work and the different tools which can be used to simulate the attacks are studied. The mitigation plan for a network to prevent a DDOS attack is identified.

Title: Security in VLAN

The case study does a study on VLAN technology and how it is used to improve the performance of a network. The different attacks which are targeted on VLAN infrastructure like private vlan attacks, mac-flooding , multicast brute force attack is understood.

Title: Comparative study of IPSEC and SSL VPN

The case study does a comparative study of IPSEC and SSL VPN, the deployment scenarios where they are used and the challenges faced in networking environments like NAT, Firewalls etc. The methods by which IPSEC and SSL VPN derive dynamic session keys and the different protocols which are involved during a negotiation is analyzed

Title :Spoofing attacks and defense

The case study understands the different types of spoofing attacks like IP spoofing , mac-spoofing ,the anatomy and the different tools which are used to conduct the attacks. The different defense mechanisms by which the attacks can be defeated like access control lists, port –security, mac-address authentication is analyzed.