Work place: Department of CSE, MRIU, Faridabad, India
E-mail: kuldeep_karan@rediffmail.com
Website:
Research Interests: Computational Engineering, Engineering
Biography
Kuldeep Tomar is a Research Scholar in the Department of CSE, MRIU, Faridabad, 121001, India. He is currently working as Associate Professor and Head of the Department of CSE in NGFCET, Palwal, Faridabad, and Haryana. He was born in Sonepat, Haryana on 2nd Oct, 1978. He has done M.E/ M.Tech in Computer Science and Engineering from C.I.T.M., Faridabad, India.
He has a total experience of 12 years in different organizations. He is currently working as Associate Professor in NGF College of Engineering & Technology, Palwal, Faridabad, Haryana. He also has worked as Assistant. Professor in Skyline Institute of Engineering & Technology, Gr. Noida; as Senior Lecturer in B.S.A.I.T.M., Faridabad; as Technical Head/Manager at SSI (Software Solutions Integrated Ltd. and as Sr. Faculty at Hartron Workstation (Haryana Govt. Undertaking).
He has published more than 12 papers in International/National Journals and conferences etc. Has is also written a book. He also is a member of Computer Society of India, Membership No:N1039627.
DOI: https://doi.org/10.5815/ijcnis.2014.11.05, Pub. Date: 8 Oct. 2014
Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security breaches have also increased. Data on a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are lots of mechanisms available but still they are not good enough because of dynamic environment. Such kind of attacks can be countered by applying appropriate policies on network edge devices like Adaptive Security Appliance, firewalls, web servers, router etc. Also the packets which are transferred between networks, they should deeply inspect for malicious or any insecure contents. In this paper firstly we would study Network security issues and available mechanism to counter them our focus would be on inspecting the HTTP packets deeply by applying policies on ASA. Finally we would use Graphical Network Simulator (GNS3) to test such a policy.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals