Sunteți pe pagina 1din 4

S No.

Seminar Topic
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 IDS 20 21 22 23 24 25 Snorts 26 Watch Dog 27 28 29 Optimal parameters 30 31 32 Architecture improvisation Current scenario advantage monitoring tools for internet security Manager Based IDS Algorithm improvisation SQUID proxy in linux Query optimization Green Computing/Green Cloud Search Engine Wireless Vechicle Logger Secure Zone based Routing Protocol for MANET Voice over Bluetooth using Voip Information retrieval system Software cost Estimation Secure VOIP over WLAN Mobile data Management Security and access control Sensor & Ad-hoc n/w Computer & n/w security Azure O.S Carbon nano tube Internet Security (Broad area of research/ seminar) ACL

Name of Student
AJAY BHATI(IT) AJAY CHAUHAN(IT) AMIT KAUSHIK(IT) ANKIT BHARDWAJ(IT) ANKUR SAINI(IT) ANURADHA(IT) BHAGAT SINGH(IT) GAURAV KALA(IT) MANOJ(IT) SANJEEV DAGAR(CSE) SATPAL SINGH(CSE) SUNDER SINGH(CSE) BHAWNA VASHISHTH(IT) AMIT KUMAR(IT) ISHA NARANG(IT) LOKENDER(IT) KAPIL MITTAL(IT) DEVASHISH KAR(CSE) HARMEET SINGH(CSE)

IDS ARCHIETECTURE ACL Structure Algorithms Firewalls LINUX Based IP chains and Tables LAVNEET BAREJA(CSE) NIKHIL SHARMA(IT) LAVKUSH(CSE) PAWAN KUMAR RAJPUT(IT) PRADEEP KAUSHIK(IT) PRADEEP SINGHAL(IT) NALIN KUMAR(CSE) PRASHANT BINDAL(IT) DEEPIKA PATHANIA(CSE) HARI SHANKAR(CSE) RAHUL SINGHAL(IT)

Types of attack 33 Protocol design for improvising internet security 34 Protocol design for improvising internet security 35 36 37 38 39 40 41 42 43 Current architecture of MANET 44 Mirage theory for deception based detection(shortcomings) 45 Intrusion detection in MANET (latest) 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 Zone based IDS(shortcomings and algorithm) Agents in IDS Signature based vesus anomaly IDS Host based S network based IDS ID in Hippocratic database Parameter to enhance the working of algorithm for web content mining suitable for mobile device Security issues in Ad hoc network Issues in mobile internet protocol Secure routing protocols in internet Virtual reality current technologies and improvising Security issues in defence and proposed solutions Design and implementation of multipath routing Genetic algorithm for enforcing security Information retrival technique for IDS Study of any tool for IDS (Practical implementation) Infrasrtructure challenges for IDS Problem with network based IDS Multilocation network based real time IDS Security in LINUX (Practical Implementation) Network control and management Topology control and management in internet security Node localization techniques Security and privacy issues IPV4 And IPV6 Security in IPV6 Security in MANET (Mobile Ad-Hoc network)

NITSHANSHU KHATRI(CSE) VIKAS CHOURASIA(CSE) ABHISHEK UPADHYAY(CSE) NISHA JANGRA(IT) GOPAL SHARMA(IT) KRISHAN BHARDWAJ(CSE) ADITI(CSE) RAVI GOYAT(CSE) UJJAWAL SRIVASTAV(CSE) VICKY BIDHURI(CSE) RAHUL AGGARWAL(CSE) SAMIT BHARDWAJ(CSE) RAJ KUMAR(IT) AMIT KUMAR DWIVEDI(CSE) SWATI SHARMA(IT) SANDEEP SEHRAWAT(CSE) SAKSHI SETHI(IT) SAMITA SAYAL(IT) RANJEET(IT) RISHAB SHATMA(IT) AMIT KUMAR(IT) SACHIN KUMAR(IT) DHRUV SHARMA(CSE) SANDEEP KUMAR(IT) SANJAY KUMAR(IT) DIVYA SHARMA(IT) SARITA KUMARI(IT) SAURABH KUMAR(IT) SAYED AUSAF ALI(IT) SUNIL KUMAR(IT) PRIYANKA(IT) SUPRIYA MANCHANDA(IT)

Enhance network IDS in a smart enterprise environment 65 Measuring the performance of current IDS 66 67 68 69 70 71 72 73 74 75 76 77 Future of internet security 78 79 80 81 82 83 84 Shortcomings of self securing network interface architecture 85 86 87 88 89 90 Performance analysis of protocol basd IDS 91 92 93 NAVEEN KUMAR(CSE) *Improvising the design of honey pot system applied in the NITISH KUMAR(CSE) LAN security PRAVESH(CSE) Advance pattern matching algorithm for IDS Enhancing the performance of current web crawler Security issues in web crawling *Implementation and architecture issues of wireless network IDS Optimizing the performance of CSI-KNN algorithm for dependable NIDS Evaluation and analysis of deployment priorities of IDS KUNAL JANGHU(CSE) HARISH (CSE) Comparison of manager selection algorithm in static and dynamic condition Enhancing the performance of AIPM Survey of internet security breaches in countries Optimizing signature based extrusion detection Study of NS-2 simulator Enhancing the performance of manager selection algorithm ARZOO SOROUT(CSE) ASHISH KUMAR(CSE) ASHISH RAJ(CSE) NARENDER(IT) ASHISH RATHORE(CSE) BHARAT BHUSAN SONI(CSE) DEV KUMAR SHARMA(CSE) Security network audit log on a untrusted machine Design and implementation of IDS for LINUX system/ Window Design of a sniffer detector and its implementation Improvisation for autonomous agent for IDS Advanced framework based on attack strategy analysis for IDS Minimizing the limitation of IDS on high speed network Study and analysis of CERN network security monitor Optomization the performance of HAXOR ID sensor Role based ACL performance Implementation role based access control using object technology Comparison of current ACL algorithm JATIN MIGHLANI(CSE) MAMTA SHARMA(IT) MANOJ KUMAR(IT) NEERAJ(IT) KAVINDER SINGH(IT) VIPIN LAMBA(IT) DHEERAJ KUMAR(CSE) AMIT KUMAR(CSE) ANUJ DHANKAR(CSE) ARUN KUMAR (CSE) ARUN KUMAR SINGH(CSE) MANISH KUMAR(CSE) SWATI RAINA(IT)

RAVI KANT(CSE) LAXMI NARAYAN(CSE) MOHIT(CSE)

94 95 96 97 98 99 100

Enhancing the colony algorithm for IDS Study and comparison of secure routing in MANET Study and optimization of swarn intelligent secure routing algorithm for networks Efficient routing algorithm for internet securtiy Enforcing network security standards issues in IPV6 Qualnet simulator (working presentation) Performance analysis of qualnet simulator in network Current trends in wearable computing

RAHUL THAKUR(CSE) PANKAJ MISHRA(IT) RAVINDER(CSE) RUDRA PRATAP SINGH(CSE) SACHIN KUMAR(CSE) SUNIL KUMAR(CSE) SURENDER KUMAR(CSE) SAURABH KUMAR(IT) VINAY RATHEE(IT) VAIBAHV CHATURVEDI(CSE)

101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121

Current technologies used in biometrics Uses of boi metric In network security Fine-grained access control (implementation in SQL) Comparative study of intrusion prevention system(IPS) and IDS Data mining algorithms for network security Study and analysis the performance mobile agent *Security protocol for sensor network Comparative study of 2G,3G,4G DNA computing in security Agent operating system Bio molecular computer MPEG 7 Visual cryptography with documentation Zone based ANT colony routingin MANET Audio captcha: existing solutions assessment and a new implementation for VoIP technology Bubble sensing Agent based system and application Multicasting in AD-HOC networks Embedded auditors for intrusion detection Application of genetic algorithm I network routing

S-ar putea să vă placă și