Projects and Reports

Research Topics

This section of the website contains cyber security research topics for papers, projects and presentation . Latest topics related to security threats, attacks and mitigation techniques are provided below. We also have Cyber security paper writing services where we develop custom papers based on specific titles.

1. Database Security threats

Understand the different types of threats targeting a database like SQL injection attack , how they work and different techniques which should be used to mitigate these attacks

2. DDOS attacks and financial loss

Understand the impact of DDOS attacks on mission critical servers and how it can impact an organization financially

3. Malware mitigation plan

Understand the different types of malware on the internet and measure your networks vulnerability of the same. Design a mitigation plan for the identified malware vulnerability.

4. Study of Phishing, types and mitigation techniques

Understand how phishing attacks work , the different types of phishing techniques and counter measures

Security Paper Writing Services – Email Us

5. Comparative study of trojan and antivirus

Perform a study of trojans and antivirus, how they differ in their working ,impact on commercial networks and mitigation technique.

6. Comparative study of intrusion detection and intrusion prevention systems

Understand the working for intrusion detection and intrusion prevention systems , identify the differences and why you would recommend IPS over IDS.

Cyber Security reports – Click Here

7. Cyber Security assessment

Identify the method you would use to conduct a cyber security assessment for an organization based on different available standards like NIST Guidelines, SANS, CISecurity etc.

8. Web application Penetration Testing

Design a penetration test plan for web application using standards like OWASP and identify the different tools (Commercial and free) which you would use to conduct the tests.

9. Fingerprinting Tool

Develop a custom fingerprinting tool using Python which would identify the operating systems of the remote host.

Security Paper Writing Services – Email Us

10. Practical analysis of Key loggers

Understand how key loggers work, how they get installed on your computer and the security issues encountered in a scenario.

11. Ransomware attacks

Understand the technique behind ransomware attacks , how they work on a network and different mitigation techniques.

Cyber Security reports – Click Here

12. Password cracking

Identify different password cracking techniques like brute force, how they work and the different tools used for the same.

13. Data Backup Security

Design your network infrastructure to protect your backups. The backup data should be stored on secure servers accessible only by authorized personal.

14. IoT Security

Design a solution to identify security issues in IOT products and report it to the customer instantaneously.

Security Paper Writing Services – Email Us

Cyber Security reports – Click Here

Network programming assignment topics

This section of the website contains topics for network programming assignment. Scripts are developed using Python with additional frameworks.

TCP Syn Sender

A TCP packet sender developed with Python which sends custom TCP SYN Packets.

Mac Spoofer

A script developed with Python which sends packets with custom mac-address.

UDP Packet Injector

A UDP packet sender developed with Python which sends custom UDP Packets.

IP Scanner Tool

Script developed with Python which scans the list of IP address on the network.

Lan Speed Testing Tool

Script developed with Python which tests the speed of a LAN network.

Mac Finder Tool

Script developed with Python which finds the mac-address of a device based on IP address.

The source code for the above tools and scripts is included as part of the course Network Testing Course

Network Security assignment Topics

This section of the website contains network security assignment topics. The assignment title along with description is provided which can be used for research activity.

Secure network design with DMZ (Demilitarized Zone)

Understands the concept of Demilitarized zone in a network environment and the mechanism and network design strategy by which a server which is exposed to the internet can be setup in DMZ zone for access by users on the internet and the LAN.

Comparative study of Network and application layer firewalls

A comparative study on network and application layers firewalls, deployment strategies, the limitations and improvements, and the typical attacks which are blocked using the firewalls.

Database attacks and defense

Understands the different types of attacks which are targeted on a database infrastructure, like network sniffing, weak passwords, sql injection, brute force attacks etc. The anatomy of the attacks and the defense mechanism for each of the attacks is identified.

MITM vulnerable protocols and mitigation

Understands the anatomy of a Man in the middle attack and the anatomy. The different protocols which are vulnerable to the attack like, TCP, ARP etc and real time environments where the attacks are used are analyzed.

Comparative study of Firewalls, IDS and IPS

A comparative study on firewalls, IDS and IPS. The deployment scenarios, attacks which are defended by the devices, limitations and improvements are understood. The different vendors and modes of the devices are researched and documented.

Wireless migration from WEP to WPA

Understands the limitation and security issues with the WEP protocol and the improvements with WPA protocol. The different components which are required to setup WPA based wireless infrastructure like supplicants, WPA supported access points are understood

Network Security Case Study

This section contains network security case study topics.

Title: IPSEC issues with NAT firewalls and IP Fragments with mitigation.

The case study does a detailed study on IPSEC and its different modes like transport and tunnel mode. IPSEC issues with NAT firewalls and IP fragmented packets and the different mitigation techniques which are available are understood.

Title: Eavesdropping vulnerable protocols and associated mitigation

The case study does a study on eavesdropping and the techniques used by the attacker like sniffing to perform the attack and the common protocols like telnet, http etc which are susceptible to the attack. How improved protocols like SSH, HTTPS can be used to prevent the attacks are understood.

Title: Attacks on a switching infrastructure and mitigation

The case study does a study on different types of attacks which are targeted on a switch infrastructure like cam flooding, ARP cache poisoning, STP and VLAN based attacks are understood. The anatomy of the attacks and different security features which are available on the switch which can be configured to mitigation the attacks are analyzed.

Title: DDOS based attacks on TCP and ICMP

The case study does a study on the anatomy of a DDOS attack and how it differs from a DOS attack. DDOS attacks which are based on TCP and ICMP, how they work and the different tools which can be used to simulate the attacks are studied. The mitigation plan for a network to prevent a DDOS attack is identified.

Title: Security in VLAN

The case study does a study on VLAN technology and how it is used to improve the performance of a network. The different attacks which are targeted on VLAN infrastructure like private vlan attacks, mac-flooding , multicast brute force attack is understood.

Title: Comparative study of IPSEC and SSL VPN

The case study does a comparative study of IPSEC and SSL VPN, the deployment scenarios where they are used and the challenges faced in networking environments like NAT, Firewalls etc. The methods by which IPSEC and SSL VPN derive dynamic session keys and the different protocols which are involved during a negotiation is analyzed

Title :Spoofing attacks and defense

The case study understands the different types of spoofing attacks like IP spoofing , mac-spoofing ,the anatomy and the different tools which are used to conduct the attacks. The different defense mechanisms by which the attacks can be defeated like access control lists, port –security, mac-address authentication is analyzed.