You are on page 1of 2

INDEX

Abstract i
List of Figures ii

List of Tables iii

List of Publications iv

List of Abbreviations v

CHAPTER No CONTENT PAGE


NO
CHAPTER 1 INTRODUCTION 1
1.1 Overview 1
1.2 Problem Definition 3
1.3 Objective 4
1.4 Chapter Summary 4

CHAPTER 2 LITERATURE SURVEY 5


2.1 Overview 5
2.2 Related Work 5

CHAPTER 3 METHODOLOGY 11
3.1Overview 11
3.2 Proposed Plan of Work 16
3.3 Project Plan 17

CHAPTER 4 TOOLS AND PLATFORM 18

CHAPTER 5 DESIGN AND IMPLEMENTATION 19


5.1 Designing of Network 19
5.2 Naming And Assigning Ids 21
5.3 Implementation of Attacks 21
5.4 Implementation of Data Security Management 26

CHAPTER 6 RESULTS AND CONCLUSION 28


6.1 Experimental Results 28
6.2 Performance Analysis
6.3 Conclusion 34

CHAPTER 7 FUTURE SCOPE 35


CHAPTER 8 REFERENCES 36
CHAPTER 9 APPENDICES 39
A. CALL FOR PAPER
B. PUBLISHED PAPER
C. PLAGIARISM REPORT

You might also like