You are on page 1of 4

Project Synopsis

Data Compression Techniques

Under the Supervision of


Ms. Renu Dalal

Submitted by:
Gaurav Sharma : 00110102713
Harshvardhan : 00910102713
Gaurav Singh : 06410102713

B. Tech. CSE 4th Year


Ambedkar Institute of Advanced
Communication Technologies & Research
GGSIPU, New Delhi
Abstract
Websites & Web Based Applications are prone to security risks. And so are any
networks to which web servers are connected. Security is a vital aspect for providing a
reliable service on the web. Website security is achieved by a number of network
protocols at all tiers, for which encryption and key generation algorithms are essential
to protect data integrity and confidentiality in transit.
Primarily, we are to develop a Cloud-deployed web application which will be secured
using firewalls, authentication measures, data encryption and intrusion detection
systems.
Secondly, we will perform penetration testing on the developed web application as
part of routine security audit.
We will use current vulnerability analytic tools to demonstrate various security
features of our Website.
Introduction

Data compression is an integral part of data transmission, storage and processing. We


cover different data compression techniques, in the lossless and lossy compression
categories, with respect to different types of data such as text, audio, and video data
under specific application circumstances or requirements. We introduce the basic
theory by Shannon for information encoding, and recent advances in mathematical and
algorithmic aspects of data compression. We emphasize on application problems and
efficient implementation issues. We give an overview of sound, image and frame-
based (MPEG-1/2/4, H.261/3/L) and object-based (e.g. MPEG-4) video coding
standards.

Functional Requirements
The proposed Security Algorithms, Protocols and firewall must support the
following functions:
A Secured & JavaScript enabled browser must be used by the users (Chrome,
Firefox etc.).
User must be authenticated using secured private connection with an Anti-bot
verification feature.
Intrusion Detection is the main chain-link to prevent.
The IP Address of the user must be verified & monitored for unusual behavior
like spoofing, redirecting etc.
The Website's Firewall must reserve some ports on the target system.
IP address will be blacklisted, reports must be sent to both Admin and user & a
quick solution must be availed.
Security measures must be taken so that it does not affect the website's
responsiveness, flexibility & interaction.

Background
The following keywords have been frequently used in our analysis of the website:

Authentication: A security measure designed to verify the identity of a transmission,


user, user device, entity,
or data. [3]
Back Door: Hidden software or hardware mechanism used to get around security
controls.
Firewall: Hardware or software that permits only authorized users to enter, and logs
attempted intrusions. [2]
Malicious Code: Any type of software capable of performing an unauthorized process
on an information
system.
Phishing: Impersonating a legitimate entity to illegally acquire information via email,
phone calls, voicemail, or
text messaging.
Spoofing: Impersonating another person or computer, usually by providing a false
email name, URL, domain
name server, or IP address.
Spyware: Software that collects information without the user's informed consent.
Audit: A process conducted by qualified, independent auditors to review and examine
records and activities to verify compliance with applicable requirements resulting in a
formal report that could require corrective action. [2]
Botnet: A group of computers that have the same bot installed, that can communicate
with and control each other, and are usually used for malicious activities (create and
send spam email, propagate malicious software, or other cyber-attack).
Technology Used
For Developing the Website, JSP will be used along with the interaction of Java
Servlets to ensure secured, worm-free environment.

Java Programming will be used to code the Authentication Algorithms and it will be
embedded to a Java Server Page (JSP).
JSP uses Java Programming so is easily portable. It also offers higher performance
than other server side pages like CGI, Perl.
We will be using several software (SQL Injector, Metasploit, w3af etc.) and tools (pen
test-tools etc.) for penetration testing of our website, checking the strength of its
stronghold.

References
1. William Stallings, Cryptography and network security: principles and
practices (2006), Pearson Education India.
2. M.T. Dlamini, J.H.P. Eloff, M.M. Eloff, Information security: The moving
target (2009), Computers & Security (Vol. 28, Issues 3-4)
3. Lori M. Kaufman, Data Security in the World of Cloud Computing (2009),
IEEE Security & Privacy (Vol.7, Issue 4)