This section contains network security case study topics.
Title: IPSEC issues with NAT firewalls and IP Fragments with mitigation.
The case study does a detailed study on IPSEC and its different modes like transport and tunnel mode. IPSEC issues with NAT firewalls and IP fragmented packets and the different mitigation techniques which are available are understood.
Title: Eavesdropping vulnerable protocols and associated mitigation
The case study does a study on eavesdropping and the techniques used by the attacker like sniffing to perform the attack and the common protocols like telnet, http etc which are susceptible to the attack. How improved protocols like SSH, HTTPS can be used to prevent the attacks are understood.
Title: Attacks on a switching infrastructure and mitigation
The case study does a study on different types of attacks which are targeted on a switch infrastructure like cam flooding, ARP cache poisoning, STP and VLAN based attacks are understood. The anatomy of the attacks and different security features which are available on the switch which can be configured to mitigation the attacks are analyzed.
Title: DDOS based attacks on TCP and ICMP
The case study does a study on the anatomy of a DDOS attack and how it differs from a DOS attack. DDOS attacks which are based on TCP and ICMP, how they work and the different tools which can be used to simulate the attacks are studied. The mitigation plan for a network to prevent a DDOS attack is identified.
Title: Security in VLAN
The case study does a study on VLAN technology and how it is used to improve the performance of a network. The different attacks which are targeted on VLAN infrastructure like private vlan attacks, mac-flooding , multicast brute force attack is understood.
Title: Comparative study of IPSEC and SSL VPN
The case study does a comparative study of IPSEC and SSL VPN, the deployment scenarios where they are used and the challenges faced in networking environments like NAT, Firewalls etc. The methods by which IPSEC and SSL VPN derive dynamic session keys and the different protocols which are involved during a negotiation is analyzed
Title :Spoofing attacks and defense
The case study understands the different types of spoofing attacks like IP spoofing , mac-spoofing ,the anatomy and the different tools which are used to conduct the attacks. The different defense mechanisms by which the attacks can be defeated like access control lists, port –security, mac-address authentication is analyzed.