Preview

final report

Satisfactory Essays
Open Document
Open Document
7400 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
final report
STRATEGY TO FILTER AND BLOCKING TRAFFIC CREATE
BY ANTI-CENSORSHIP SOFTWARE IN LOCAL AREA NETWORK

A thesis submitted to the Graduate School in partial fulfillment of the requirement for the degree
Master Of Science (Information Communication Technology)
Universiti Utara Malaysia

By
Kamal Harmoni Kamal Ariff

PERMISSION TO USE

In presenting this thesis in partial fulfillment of the requirements for a postgraduate degree from Universiti Utara Malaysia, I agree that the University Library may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purpose may be granted by my supervisor(s) or, in their absence by the Dean of the Graduate School. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to Universiti Utara Malaysia for any scholarly use which may be made of any material from my thesis.

Requests for permission to copy or to make other use of materials in this thesis, in whole or in part, should be addressed to

Dean of Graduate School
Universiti Utara Malaysia
06010 UUM Sintok
Kedah Darul Aman.

ABSTRACT

Anti-censorship software originally develop to fight internet censorship in China. The anti-censorship software such as Ultrasurf, Freegate, Gpass, GTunnel and FirePhoenixare become popular for the stubborn user who used the internet for thier own’s purpose and disobey the poilicies . Since it is widely use by users in organisation local area network to bypass



Bibliography: About Us - Global Internet Freedom Consortium. (2010). Retrieved 01 05, 2010, from http://www.internetfreedom.org/about Aycock, J., & Maurushat, A Becchi, M., & Crowley, P. (December 2007). A hybrid finite automaton for practical deep packet inspection. CoNEXT '07: Proceedings of the 2007 ACM CoNEXT conference. ACM. Becchi, M., & Crowley, P. (December 2007). A hybrid finite automaton for practical deep packet inspection. CoNEXT '07: Proceedings of the 2007 ACM CoNEXT conference. ACM. GIFC. (2010). Retrieved 01 05, 2010, from About Global Internet Freedom Consortium: http://www.internetfreedom.org/ Hunter, C Kaiser, A. (2008, Aug 12). technopedia. Retrieved 01 05, 2010, from UltraSurf : Probably The Best Proxy Server Ever!!!: http://technopedia.info/tech/2008/08/12/ultrasurf-probably-the-best-proxy-server.html Kumar, S., Turner, J., & Williams, J. (December 2006). Advanced algorithms for fast and scalable deep packet inspection. ANCS '06: Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems. ACM. Peisert, S., & Bishop, M. (2007). how to Design Computer Security Experiments. Springer Boston. Volume 237/2007, pp. 141-148. Springer Boston. Regular Expressions.info. (2010). Retrieved 4 20, 2010, from Sample Regular Expressions: http://www.regular-expressions.info/examples.html Reuters Strange Maps. (2007, 8 3). Retrieved 3 20, 2010, from A Map of the Internet’s Black Holes: http://strangemaps.wordpress.com/2007/08/31/170-a-map-of-the-internets-black-holes/ Tan, Z Whitten, J. L., Bentley, L. D., & Dittman, K. (2004). System Analysis and Design Method. 6th ed. Boston: Mc-Graw-Hill Education. Wikipedia. (2010). Retrieved 01 05, 2010, from Internet censorship: http://en.wikipedia.org/wiki/Internet_censorship Wikipedia Xia, B. (2004). The Coming Crash Of The Matrix. China Right Forum , pp. 42-44.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    2. You can see what kind the time the IP address the destination the protocol and the length of the packet.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Recently, it was brought to my attention that there are concerns about some activities on the network that can be considered less than trustworthy. Specifically, the concerns are regarding network traffic called ping sweeps and port scans. I’m putting together this paper to explain how ping sweeps and port scans impact our network traffic.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We will use Ethereal (Ethereal.com) To intercept a sample network packages to explore possible vulnerabilities.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Killswitch Documentary

    • 954 Words
    • 4 Pages

    The Internet has become a popular source of mainstream media. A battle is raging over the control of the Internet, and the rights of the American people are at stake. The documentary Killswitch, exposes the true power of the Internet and how the government is controlling that power; violating freedom of speech and the right to privacy. The documentary takes a stand in favor of Net Neutrality, which is the principle that the Internet enables access to all-content without choosing or blocking certain websites. The efforts of Aaron Swartz and Edward Snowden to win back Internet freedom are highlighted in this documentary in order to appeal to American citizens to take action in favor of Net Neutrality. “Freedom is embedded in technology and we have to protect technology if we want to protect our freedom” (Killswitch). Internet regulation grants power to the Government and violates constitutional rights of Americans hindering the Nation’s founding principle of democracy.…

    • 954 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Nsa Deep Packet Inspection

    • 2249 Words
    • 9 Pages

    |This document explores the Deep Packet Inspection systems set in place by the United States government’s National Security Agency. Along with |…

    • 2249 Words
    • 9 Pages
    Best Essays
  • Good Essays

    “In 2001, the International Telecommunication Union calculated that, approximately 2.3 billion people had internet access at the end of that year. Since then, the percentage of people using the internet around the world has continued to grow” (Li 2). Censoring the internet has been a hot topic for quite a while now. Many people believe that censoring the web isn’t a good thing because of certain laws and rights we have as citizens. The internet has some cons but it also has many pros. The downside of the censorship is that the truth is blocked out and it violates our freedom of speech. On the other hand, censorship of the internet can reduce the numbers or even stop human trafficking, prevent identity theft, stop cyber bullying and so much…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Best Practice

    • 6167 Words
    • 25 Pages

    Produced by CESNET led working group on Network monitoring (CBPD111) Authors: Tomas Podermanski, Vladimir Zahorik March 2010…

    • 6167 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    In the past few months, there has been renewal interest in the national security issues since the occurrence of Edward Snowden incident. Internet censorship is one of the security measures in many parts of the world. This measure was implemented by the government that requires Internet search organizations to censor the website which the content include the sensitive issues. Also, the Internet Service Provider block access to foreign website such as Facebook, Twitter and Youtube. When it comes to the question of whether acceptable of Internet censorship, most people are united in the answer “No”. Those people who are in favor of it claims that this measure avoids the Internet crime to exist and the sense of belonging of citizen are stronger. On the contrary, the opponents insist that censorship on the internet obliterate the freedom of the Internet. Considering both sides of the arguments, I am prone to support the opinion that says no to Internet censorship. There are two instances that support my point of views which can classify into social issue and economics issue.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    [14] P. Lichodzijewski, A. Zincir-Heywood and M. Heywood, “Dynamic intrusion detection using self-organizing maps,” in Proc. annu. Canadian Information Technology Security Symposium, Ottawa, Canada, 2002, pp. 93–97. [15] M. Ramadas, S. Ostermann and B. Tjaden, “Detecting anomalous network traffic with self-organizing maps,” in Proc. Int. Sym. Recent Advances in Intrusion Detection, Pittsburgh, PA, USA, 2003, pp. 36–54. [16] L. Ying-Dar, T. Kuo-Kun, L. Tsern-Huei, L. Yi.Neng, H. Chen-Chou and L. Yun-Cheng, “A plataform-based SoC design and implementation of scalable automaton matching for deep packet-inspection,” Journal of Systems Architecture, vol. 53, no. 12, pp. 937–950, Dec. 2007. [17] C.A. Hudson, N.S. Lobo, R. Krishnan, “Sensorless Control of single switch-based switched reluctance motor drive using neural network,” IEEE Trans. on Industrial Electronics, vol. 55, no 1, pp. 321–329, Feb. 2008. [18] S. Jung and S. Su kim, “Hardware Implementation of a real-time nueral network controller with a DSP and a FPGA for Nonlinear Systems,” IEEE Trans. on Industrial Electronics, vol. 54, no 1, pp.265–271, Feb. 2007. [19] D. Zhang and L. Hui, “A stochastic-Based FPGA Controller for an Induction Motor Drive With Integrated Neural Network Algorithms,” IEEE Trans. on Industrial Electronics, vol. 55, no. 2, pp. 551–561, Feb. 2008. [20] C. Kruegel, F. Valeur and G. Vigna, Intrusion Detection and Correlation: Challenges and solutions. New York: Springer, 2005. [21] M. E. Locasto, J. Parekh, A. Keromytis and S. Stolfo, “Towards collaborative security and P2P intrusion detection,” in Proc. IEEE Information Assurance Workshop, West Point, NY, USA, 2005, pp. 333–339. [22] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman, S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora and M. Miyashita, “A line in the sand: a wireless sensor network for target detection, classification and tracking,” Computer Networks, vol.…

    • 9700 Words
    • 39 Pages
    Good Essays

Related Topics