09NB01 MATHEMATICAL FOUNDATIONS FOR CYBER SECURITY 3 1 0 4 NUMBER THEORY:

chardfriendlyAI and Robotics

Oct 16, 2013 (3 years and 10 months ago)

115 views


13




09NB01 MATHEMATICAL FOUNDATIONS FOR CYBER SECURITY


3 1 0 4


NUMBER THEORY:
Introduction
-

Divisibility
-

Greatest common divisor
-

Prime numbers
-

Fundamental theorem of arithmetic
-

Mersenne primes
-

Fermat numbers
-

Euclidean algorithm
-

Fermat’s theo
rem
-

Euler totient function
-

Euler’s theoerem.
Congruences:
Definition
-

Basic
properties of congruences
-

Residue classes
-

Chinese remainder theorem.













(10)


ALGEBRAIC STRUCTURES:

Groups


Cyclic groups, Cosets, Modulo groups
-

Primitive roots
-

Discrete logarithms.

Rings


Sub rings, ideals and quotient rings, Integral domains.
Fields


Finite
fields


GF (p
n
), GF(2
n
)
-

Classification
-

Structure of finite fields. Lattice, Lattice as Algebraic
system, sub lattices, some special lattices.


(12)




PROBABILITY THEORY:
Introduction



Concepts of Probability
-

Conditional Probability
-

Bay
e’s
Theorem
-

Random Variables


discrete and continuous
-

central Limit Theorem
-
Stochastic
Process
-

Markov Chain.



(8)




CODING THEORY:

Introduction
-

Basic concepts: codes, minimum distance, equivalence of
codes, Linear codes

-

Linear codes
-

Generator matrices and parity
-
check matrices
-

Syndrome
decoding


Hamming codes
-

Hadamard Code
-

Goppa codes.







(6)






PSEUDORANDOM NUMBER GENERATION:
Introduction and examples
-

Indistinguishability of
Probability Distributions
-

Next Bit Predictors
-

The Blum
-
Blum
-
Shub Generator


Security of the
BBS Generator.





(6)
























Total
42

REFERENCES:

1.

Ivan Niven, Herbert S. Zuckerman, and Hugh L. Montgomery, ‘An introduction to the theory of
numbers’, John Wiley and Sons 2004.

2.

Douglas Stinson, ‘Cryptography


Theory and Practice’, CRC Press, 2006.

3.

Sheldon M Ross, “Introduction to Probability Models”, Academic Press, 2003.

4.

C.L. Liu, ‘Elements of Discrete mathematics’, McGraw Hill, 2008.

5.

Fraleigh J. B., ‘A first course in abstract algebra’, Narosa, 1990.

6.

Joseph A. Gallian, ‘’Contemporary Abstract

Algebra’, Narosa, 1998.










09NB02 COMPUTER ARCHITECTURE AND SECURITY ANALYSIS

3 0 0 3


INTRODUCTION
: Register Transfer language


Register, Bus and Memory Transfers
-

Arithmetic
Logic and Shift Micro operations.


Instruction codes


Instructions


Timing and Control


Instruction Cycle


Input, output and Interrupt






(8)


14



CENTRAL PROCESSOR ORGANIZATION
: Instruction Formats


Addressing Modes
-

Program
Control


Control Memory











(5
)


MEMORY AND INPUT/OUTPUT ORGANIZATION:

Basic Concepts


Memory Hierar
chy


Main
Memory


Cache and Virtual Memory Concepts


Input / Output Interface


Direct memory
Access


I/O Processor.

(8)


INRODUCTION TO PARALLEL PROCESSING:

Parallelism
-

pipelining
-

pipeline hazards.
Memory interleaving

-

Parallel computer architecture classifications.


Introduction to CISC and
RISC Processors

(6)



SECURITY ANALYSIS:
Basic components of Security
: Confid
entiality, Integrity, Availability,
Threats. Security policies, types , role of trust, types of access control










(5)








AUTHENTICATION:
Basics,

Passwords: attacking,
countering,

pass
word ageing

Biometrics





(5)










CONFINEMENT PROBLEM:
Introduction, isolation: virtual machines, sandboxes, covert

channels, detection analysis , mitigation














(5)




Total 42


REFERENCES:

1.

Morris Mano M, “Computer System and Architecture”, Pearson Education, New Delhi, Third
edition, 2004.

2.

D. Patterson and J. Hennessy, “Computer Organization and Design:

The Hardware/Software
Interface”, Morgan Kaufmann Publishers, Inc., Third edition, 2002.

3.

Kai Hwang and Briggs F.A., “Computer Architecture and Parallel Processing”, McGraw Hill
International Edition,

New Delhi, 2007.

4.

Matt Bishop, “Computer Security”, Pea
rson Education, New Delhi, 2003.

5.

Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas
Publishing House, New Delhi, 2003

6.

Micki Krause, Harold F. Tipton, “ Handbook of Information Security Management”, Vol 1
-
3
CRC Press LLC, 2
004



09NB03 INTERNETWORKING AND TCP/IP



3 0 0 3


INTRODUCTION
:

Networking basics
-

LANs and WANs
-

Network hardware components,
Server
-
base
d networks
-

Peer
-
to
-
peer networks
-

Server
-
based vs. peer
-
to
-
peer networks
-

Specialized servers
-

Combination networks
-

Network packets


Addressing packets


Multiplexing
-

Protocols
-

The OSI reference model


Internet Protocol Stack.






(8)









DATA LINK CONTROL:
Asynchronous and Synchronous transmission
-

MAC protocol;
Controlled & contention
-
based
-

IEEE 802.11 LANs


System architecture, physical layer, Media
Access Control


MAC management


Error
Detection and Correction Techniques



CRC and
Linear Block Codes


Transmission Protocols


Retransmission techniques


-
Token ring


FDDI.














(9)




TRANSPORT LAYER:
Introduction to TCP


packet format


sliding window protocol


Establi
shing

and Closing TCP connection


Response to Congestion and variance in delay


TCP performance


Reserved and available port numbers.











(8)














15


NETWORK PROTOCOLS
:

IP Layers and functions


Versions, IP Addressing


classful
addressing , classless addressing, Delivery, Forwarding and Routing of IP packets, ARP, RARP,
Internet Protocol, Datagram, Fragmentation, IP Pa
ckets, ICMP, IGMP, User Datagram Protocol.












(12)













NETWORK SECURITY
:

Cryptography, Privacy, Digital Signature, IPSec, Transport Layer
Security, Application Layer Security, Firewalls.














(5)















Total 42


REFERENCES:

1.

Fitzgerald and Dennis, “Business Data Communications and Networking”, John Wiley and
Sons, Delhi, 2005.

2.


William Stallings, “Data and Computer Communications
”, Eighth edition, Prentice Hall, New

Delhi, 2006.

3.


James F Kurose, et al, “Computer Networking: A Top
-
Down Approach Featuring the
Internet”, Fourth edition, Addison Wesley, 2008.

4.

Achyut S Godbole, “Data Communications and Networks”, Tata Mc
-
Graw
Hill, 2002.

5.

Ferouzan, “Data Communications and Networking”, Tata Mc
-
Graw Hill, 2006.





09NB04 BIOMETRIC SYSTEMS

3 0 0 3


INTRODUCTION:
Biometric fundamentals


Biometric technologies


Biometrics Vs traditional
techniques


Characteristics of a go
od biometric system


Benefits of biometrics


Key biometric
processes: verification, identification and biometric matching


Performance measures in
biometric systems: FAR, FRR, FTE rate, EER and ATV rate.

(9)
















PHYSIOLOGICAL BIOMETRICS :
Leading technologies :

Finger
-
scan


Facial
-
scan


Iris
-
scan


Voice
-
scan


components, working principles, competing technologies, strengths and
weaknesses


Other physiological biometrics

: Hand
-
scan, Retina
-
scan




components, working principles, competing technologies, strengths and weaknesses


Automated fingerprint identification systems.











(12)





BEHAVIOURA
L BIOMETRICS:
Leading technologies:

Signature
-
scan


Keystroke scan


components, working principles, strengths and weaknesses.













(4)











BIOMETRIC APPLICATIONS:
Categorizing biometric applications


application areas: criminal
and citizen identification, surveillance, PC/network access, e
-
commerce and retail/ATM


costs to
deploy


other issues in deployment (9)




PRIVACY AND STANDARDS IN BIOMETRICS
: Assessing the Privacy Risks of Biometrics


Designing Privacy
-
Sympathetic Biometric Systems


Need for standards


different biometric
standards.




(8)


















Total 42




16



REFERENCES:

1.

Samir Nanavati, Michael Thieme, Raj Nanavati, “Biometrics


Identity


Verification in a Networked World”, Wiley
-
dreamtech India Pvt Ltd, New Delhi, 2003

2.

Paul
Reid, “Biometrics for Network Security”, Pearson Education, New Delhi, 2004

3.

John R Vacca, “Biometric Technologies and Verification Systems”, Elsevier Inc, 2007

4.

Anil K Jain, Patrick Flynn, Arun A Ross, “Handbook of Biometrics”, Springer, 2008




09NB05
ADVA
NCED DATA STRUCTURES

3 1 0 4


INTRODUCTION :
Primitive operations in a linked list
-
Tree definitions and representations


Tree Traversals


Graph
definitions and representations


Graph traversals


Shortest path
algorithms







(8)


SEARCHING :
Linear search


Binary search
-

Binary search trees


AVL search trees


Red
-
Black trees


B trees
-

B+ trees


Tries


Hashing and collision resolution








(8)

COMPLEXITY ANALYSIS:

A
nalysis framework


Asympto
tic notations and basic efficiency
classes


Mathematical analysis of non
-
recursive and recursive algorithms. Divide and Conquer:
The general method


Binary search analysis


Quick
-
sort analysis


Merge sort analysis.






(8)

GREEDY METHOD:

The general method
-

Knapsack problem
-

Minimum spanning trees : Prim’s
algorithm, Kruskal’s algorithm.

Dynamic Programming: The general method : Overlapping sub
-
problems, Optimal substructure, Memorization
-

Knapsack problem
-

Optimal binary search tree.






(9)

BACKTRACKING:

The general method : State
-
space tree for fixed and variable size tuples
-

Knapsack problem
-

n queens problem. B
ranch and Bound: The general method : LC Search,
Bounding, FIFO branch and bound, LC branch and bound
-

Knapsack problem
-

Travelling
salesperson problem.




(9)



Total 42

REFERENCES:

1.

Anany Levitin, “Int
roduction to the Design and Analysis of Algorithms”, Pearson Education, New
Delhi, 2007.

2.

Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, “Fundamentals of Computer
Algorithms”, Galgotia Publications, New Delhi, 2008.

3.

Adam Drozdet, “Data Structures

and Algorithms in C++”, Cengage Learning, New Delhi, 2010.

4.

Mark Allen Weiss, “Data Structures and Problem Solving using Java”, Addison Wesley, USA,
2006.




09NB06 APPLIED CRYPTOGRAPHY

3 0 0 3


INTRODUCTION:
Cryptography

and

modern
cryptography


The set
ting of private
-
key encryption


Historical ciphers and their cryptanalysis


Basic principles of modern cryptography


Services,
Mechanisms and Attacks


OSI security architecture.












(5)



17


SYMMETRIC

TECHNIQUES:

Definition


S
ubstitution ciphers


Transposition ciphers
-

Stream
and block ciphers
-

A5, RC4 .Characteristics of good ciphers


-

Data Encryption Standard
(DES)


International Data Encryption Algorithm


Advanced Encryption Standard


Block cipher
modes of operation


Confidentiality using symmetric encryption. (11)


ASYMMETRIC TECHNIQUES:
Principles of Public Key Cryptosystems


The RSA Algorithm


Key Management


Diffie Hellman Key Exchange


Elliptic Curve Cryp
tography


over reals,
prime fields and binary fields, Applications, Practical considerations. Cryptography in Embedded
Hardware







(9)


MESSAGE AUTHENTICATION:

Authentication requirements


Authentication functions


Messa
ge Authentication Codes (MAC)


Hash functions


Security of hash functions and MACs.
(8)


HASH AND DIGITAL SIGNATURES:

MD5 Message Digest Algorithm


Secure Hash Algorithm
(
SHA)

RIPMED160
-

HMAC
-

Digital Signatures
-

Authentication Protocols
-

Digital Signature
Standard (DSS) (9)


Total 42


REFERENCES:

1.

Bernard Menezes, “Network Security and Cryptography”, Cengage Learning, New Delhi,
20
10.

2.

Ingemar J.Cox, Matthew L.Miller, Jeffrey A.Bloom, Jessica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Morgan Kaufmann Publishers, New York, 2008.


3.

William Stallings, “Cryptography and Network Security, Prentice Hall, New Delhi, 2006
.

4.

Wenbo Mao, “Modern Cryptography


Theory and Practice”, Pearson Education, New Delhi,
2006.


5.

Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography”, Chapman &
Hall/CRC, New York, 2007.

6.

Bruce Schneier,

“Applied Cryptography”, John Wiley & So
ns, New York, 2004.




09NB07 DATABASE DESIGN AND SECURITY

3 1 0 4


INTRODUCTION:

Data models, structure of relational databases, component of management
system


DDL, DML
, database

languages, SQL standard, database users and administrators.


(6)









RELATIONAL DBMS:

Design issues
-

basic normal forms and additional normal forms,
Transforming E
-
R diagram to relations, Integrity constraints, Query processing and optimization








(9)


TRANSACTION PROCESSING:

Transaction concept, concurrent execution, isolation, testing for
serializability, Concurrency control, lock based
-

time
-
stamp based
-

validation bas
ed protocols,
multi
-
version schemes, deadlock handling.












(9)









DATABASE SECURITY:
Introduction to database security, security models, physical and logical
security, security requirements, reliability and integrity, s
ensitive data, inference, multilevel
databases and multilevel security, access control
-

mandatory and discretionary , security
architecture, issues.












(9)



SECURITY ISSUES:
Application access, security and authorization, authoriza
tion in SQL,
encryption and authentication, secure replication mechanisms, Audit
-

logon/logoff, sources,

18


usage and errors, changes, external audit system architecture, archive and secure auditing
information











(9)















Total 42



REFERENCES:

1.

Abraham Silberschatz, Hanry F Korth, Sudarshan S, “Database Systems Concepts”,
McGraw Hill, 2007.

2.


Ron Ben Natan, “Implementing database security and auditing”, Elsevier publications,
2005.

3.


Hassan A. Afyduni, “Da
tabase Security and Auditing”, Course Technology


Cengage
Learning, NewDelhi, 2009.

4.

Raghu Ramakrishnan, "Database Management Systems", McGraw Hill/ Third Edition,2003

5.

Ramez Elmasri, Shamkant B. Navathe , “Fundamentals of Database System” Addison
Wesley,

New Delhi/Fourth Edition 2004

6.

M. Gertz, and S. Jajodia, Handbook of Database Security
-

Application and Trends, 2008,
Springer.



09NB08 BIOMETRIC IMAGE PROCESSING

3 1 0 4

FUNDAMENTALS:

Digital Image representation
-

Fundamental steps in Image Processing

-

Elements of Digital Image Processing Systems
-

Sampling and Quantization
-

Basic relationships
between pixels
-

Imaging Geometry
-

Transformation Technology
-

The Fourier Transform, The
Hadamard Transform, The Discrete Cosine Transform.







(7)

IMAGE PROCESSING METHODS:
Image Enhancement: The Spatial Domain Methods, The
Frequency Domain Methods
-

Image Segmentation: Pixel Classification by Thresholding,
Histogram Techniques, Smoothing and Thresholding
-

Gradient Based Segmentation:
Gradien
t
Image, Boundary Tracking, Laplacian Edge Detection.


(7)

FINGERPRINT BIOMETRICS:

Fingerprint Patterns, Fingerprint Features, Fingerprint Image,
width between two ridges
-

Fingerpr
int Image Processing
-

Minutiae Determination
-

Fingerprint
Matching: Fingerprint Classification, Matching policies. (7)

FACE RECOGNITION:

Detection and Location of Faces: Statistics
-
Based method, Knowledge
-
Based method
-

Featur
e Extraction and Face Recognition: Gray value Based method, Geometry
Feature Based method, Neural Networks method.


(7)

IRIS BIOMETRICS:

Iris System Architecture, Definitions and Notations
-

Iris Recognition: Iris
location, Doubly

Dimensionless Projection, Iris code, Comparison
-

Coordinate System:
Head
Tilting Problem, Basic Eye Model, Searching Algorithm
-

Texture Energy Feature.









(7)

FUSION IN BIOMETRICS:

Introduc
tion to Multibiometrics
-

Information Fusion in Biometrics
-

Issues in Designing a Multibiometric System
-

Sources of Multiple Evidence
-

Levels of Fusion in
Biometrics
-

Sensor level , Feature level, Rank level, Decision level fusion
-

Score level Fusio
n.



(7)

Total 42



REFERENCES:

1.

David D. Zhang, “Automated Biometrics: Technologies and Systems”, Klu
wer Academic
Publishers, New Delhi, 2000.

2.

Rafael C.Gonzalez, Richard E.Woods, Steven L.Eddins, “Digital Image Processing”,
Pearson Education, New Delhi, 2009

3.

Arun A. Ross , Karthik Nandakumar, A.K.Jain, “Handbook of Multibiometrics”, Springer,
New Delhi
, 2006


19







09NB09 CYBERCRIME INVESTIGATIONS AND DIGITAL FORENSICS













3 0 0 3


INTRODUCTION:

Introduction and Overview of Cyber Crime, Nature and Scope of Cyber Crime,
Types of Cyber Crime: Social Engineering, Categories
of Cyber Crime, Property Cyber Crime.




(6)






CYBER CRIME ISSUES
:

Unauthorized Access to Computers, Computer Intrusions, White collar
Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Porn
ography,
Software Piracy, Intellectual Property, Mail Bombs, Exploitation ,Stalking and Obscenity in
Internet, Digital laws and legislation, Law Enforcement Roles and Responses.












(9)


INVESTIGATION:

Introduction to Cyber Crime Investiga
tion, Investigation Tools, eDiscovery,
Digital Evidence Collection, Evidence Preservation, E
-
Mail Investigation, E
-
Mail Tracking, IP
Tracking, E
-
Mail Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search
and Seizure of Computers, Reco
vering Deleted Evidences, Password Cracking.











(9)


DIGITAL FORENSICS:

Introduction to Digital Forensics, Forensic Software and Hardware,
Analysis and Advanced Tools, Forensic Technology and Practices, Fo
rensic Ballistics and
Photography, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System
Forensics, Linux System Forensics, Network Forensics. (9)




LAWS AND ACTS:

Laws and Ethics, Digital Evidence Controls, Evidence Handling Procedures,
Basics of Indian Evidence ACT IPC and CrPC , Electronic Communication Privacy ACT, Legal
Policies.



(9)







Total 42

REFERENCES:

1.

Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage
Learning, New Delhi, 2009.

2.

Kevin Mandia, Chris Prosise, Matt Pepe, “Incident Response and Computer Forensics “, Tata
McGraw
-
Hill, New Delhi, 20
06.

3.

Robert M Slade,” Software Forensics”, Tata McGraw
-

Hill, New Delhi, 2005.

4.

Bernadette H Schell, Clemens Martin, “Cybercrime”, ABC


CLIO Inc, California, 2004.

5.

”Understanding Forensics in IT “, NIIT Ltd, 2005.








09NB11 OPERATING SYSTEM AND ITS SEC
URITY


3 0 0 3


INTRODUCTION:

Operating system concepts


Functions


Structure of Operating system


Types of operating system.







20





(4)

PROCESS MANAGEMENT:

Introduction to processes


Process Scheduling
-

Threads
-
CPU
Scheduling objectives, criteria


Typ
es of scheduling algorithms


Performance comparison


Inter process communications
-

Synchronization


Semaphores


Dead lock Prevention,
Recovery, Det
ection and Avoidance




(10)




MEMORY MANAGEMENT:

Single contiguous allocation


Partitioned allocation


Paging


Virtual
memory concepts



Swapping


Demand paging


Page replacement algorithms


Segmentation.

(10)



DEVICE AND FILE MANAGEMENT:
Pr
inciples of I/O hardware


I/O software


Disks


Disk
Scheduling Algorithms
--
File Systems
-

Files and Directories
-

File System Implementation
-

Allocation Methods.

(8)




SECURITY ISSUES:


Protection in Ge
neral Purpose Operating Systems: protected objects and
methods of protection


memory and address protection


control of access to general objects


file protection Mechanisms


user authentication
-

Designing Trusted Operating Systems.







(10)








Total 42


REFERENCES:

1.

Silberschatz A, Galvin P, Gagne G, "Operating Systems Concepts", John Wiley & Sons,
Singapore,

2006.

2.

Michael Palmer, Guide to Operating Systems Security”, Course Technology


Cengage
Learning, New Delhi, 2008

3.

Charles P. Pleeger, "Security in
Computing", Prentice Hall, New Delhi, 2009

4.


Deitel H M, “Operating Systems ", PHI/ Pearson Education, New Delhi, 2004.



09NB12 NETWORK SECURITY

3 0 0 3


INTRODUCTION:

Network concepts


Threats in networks


Network security controls


Importance of secur
ity


Threat models


Security concepts


Common mitigation methods.




(4)






AUTHENTICATION:

Overview of authentication


Authentication of people


Security Handshake
pitfalls


Strong pass
word protocols


Kerberos


Public key infrastructure.







(10)









IP & WEB SECURITY
: IP security: Overview
-

Architecture


Authentication Header
-

Encapsulating Security Payload
-

Key management


Web security: Web security consideratio
ns


Secure Socket Layer and Transport Layer Security


Secure electronic transaction


Web
issues











(10)


ELECTRONIC MAIL SECURITY:

Store and forward


Security services for e
-
mail


Establishing
keys


Privacy


Authentication of the Source



Message Integrity


Non
-
repudiation


Proof of
submission and delivery
-

Pretty Good Privacy


Secure/Multipurpose Internet Mail Extension.








(8)


SYSTEM SECURITY:

Intruders


Intrusion detection


Password management


Malic
ious
software: Viruses and related threats


virus countermeasures


Firewalls: Firewall design
principles


Firewall configurations


Trusted systems








(10)


Total 42


21


REFERENCES:

1.

Charles P. Fleeger, "Security in Computing", Prentice Hall, New Delhi, 2009

2.

Behrouz A.Forouzan, “Cryptography & Network Security”, Tata McGraw Hill, India, New
Delhi, 2009.

3.

William Stallings, “Cryptog
raphy and Network Security, Prentice Hall, New Delhi, 2006.

4.

Chalie Kaufman, Radia Perlman, Mike Speciner, “Network Security: Private Communication
in a Public Network”, Pearson Education, New Delhi, 2004.

5.

Neal Krawetz, “Introduction to Network Security”,
Thomson Learning, Boston, 2007.

6.

Bruce Schneier,

“Applied Cryptography”, John Wiley & Sons, New York, 2004.






09NB13 DATA MINING









3 0 0 3


INTRODUCTION:

Motivation


Data Mining Functionalities


Classification on data mining
systems


Task Primitives


Major Issues
-

Data Preprocessing.






(4)



DATA WAREHOUSE AND OLAP:

Data warehouse


Multidimensiona
l data model


Data
Warehouse architecture


OLAP Technology


Data Cube Computation.









(8)









ASSOCIATION ANALYSIS:
Basic Concepts


Frequent Item set mining methods
-

Types of
association rules.

(7)











CLASSIFICATION:

Introduction


Statistics and Probability
-

Decision
Tree Induction


Bayesian Classification


Classification by Back propagation


Rule Based
Classification


Support Vector Machines.



(9)




CLUSTER ANALYSIS:

Partitioning methods


Hierarchical Methods


Density based methods
-

Neural Network Based Methods.













(8)





ADVANCED TOPICS:

Introduction to spatial data mining


Text Mining


Web Mining.







(6)














Total 42

REFERENCES:

1.

Jaiwei Han, Micheline Kamber, “Data Mining: Concepts and Techniques”, Elsevier, 2006.

2.

Rajan Chatt
amvelli, “Data Mining Methods”, Narosa, 2009.

3.

Pang
-
Ning Tan, Michael Steinbach, "Introduction to Data Mining", Addison Wesley, 2006.

4.

Margaret Dunham, “Data Mining: Introductory and Advanced Topics”, Pearson Education,
New Delhi, 2007.

5.

Alex Berson, “Data Wa
rehousing, Data Mining and OLAP,” Tata Mc Graw Hill , 2004







09NB14 DIGITAL WATERMARKING AND STEGANOGRAPHY

3 0 0 3


INTRODUCTION:

Information Hiding, Steganography and Watermarking


History of
watermarking


Importance of digital watermarking


Applic
ations


Properties


Evaluating
watermarking systems.

(6)



22


WATERMARKING MODELS & MESSAGE CODING:
Notation


Communications


Communication based models


Geometric models


Mapping messages into messag
e vectors


Error correction coding


Detecting multi
-
symbol watermarks.






(9)


WATERMARKING WITH SIDE INFORMATION & ANALYZING ERRORS:

Informed Embedding


Informe
d Coding


Structured dirty
-
paper codes
-

Message errors


False positive errors


False negative errors


ROC curves


Effect of whitening on error rates.






(8)


PERCEPTUAL
MODELS:

Evaluating perceptual impact


General form of a perceptual model


Examples of perceptual models


Robust watermarking approaches
-

Redundant Embedding,
Spread Spectrum Coding, Embedding in Perceptually significant coefficients

(7)


WATERMARK SECURITY & AUTHENTICATION:

Security requirements


Watermark security
and cryptography


Attacks


Exact authentication


Selective a
uthentication


Localization


Restoration. (7)


STEGANOGRAPHY
: Steganography communication


Notation and terminology


Information
-
theoretic foundations of steganography


Practical steganographic methods


Minimi
zing the
embedding impact


Steganalysis (5)


Total 42

REFERENCES:

1.

Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Margan Kaufmann Publishers,
New York, 2008.


2.

Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, “Digital Watermarking”, Margan
Kaufmann Publishers, New York, 2003.


3.

Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications of
Digital Watermarking and Cont
est Protection”, Artech House, London, 2003.

4.

Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York,
2005.

5.

Peter Wayner, “Disappearing Cryptography


Information Hiding: Steganography &
Watermarking”, Morgan Kaufmann Publis
hers, New York, 2002.





09NB15 WIRELESS SECU
RITY

3 0 0 3


WIRELESS TECHNOLOGIE
S:
Introduction to wireless technologies
-

Wireless data networks
-
Personal Area Networks
-
Transmission Media


WLAN standards
-

Securing WLANS
-

Countermeasures
-

WEP (Wired Equ
ivalence Protocol).
(8)


WIRELESS THREATS
:

-

Kinds of security breaches
-

Eavesdropping
-

Communication Jamming
-

RF interference
-

Covert wireless channels
-

DOS attack


Spoofing
-

Theft of services
-

Traffic
Analysis
-

Cryptographic threats
-

Wireless
security Standards.






(9)





SECURITY IN DATA NET
WORKS:
W
ireless Device security issues
-

CDPD security (Cellular
Digital Packet Data)
-
GPRS security (General Packet Radio Service)
-

GSM (Global System for
Mobile Communication)

security


IP security. (9)




23


WIRELESS TRANSPORT LAYER SECURITY:

Secure Socket Layer
-

Wireless Transport Layer
Security
-

WAP Security Architecture
-

WAP Gateway.









(8)


BLUETOOTH SECURITY:

Basic specifications


Pico
nets


Bluetooth security architecture


Scatternets


Security at the baseband layer and link layer


Frequency hopping


Security
manager


Authentication


Encryption


Threats to Bluetooth security.








(8)














Total 42

REFERENCES:

1.

Nichols and Lekka, “Wireless Security
-
Models, Threats and Solutions”, Tata McGraw


Hill,
New Delhi, 2006.

2.

Merritt Maxim and David Pollino, ”Wireless Security”, Osborne/McGraw Hill, New Delhi, 2005.

3.

William Stallings, “Cryptograp
hy and Network Security
-

Principles and practices, Prentice
Hall,
New Delhi
, 2006.





09NB16 INTRUSION DETECTION AND PREVENTION SYSTEM

3 0 0 3



INTRODUCTION:
Understanding Intrusion Detection


Intrusion detection and prevention basics


IDS and IPS an
alysis schemes, Attacks, Detection approaches

Misuse detection


anamoly
detection


specification based detection


hybrid detection



(9)



THEORETICAL FOUNDATI
ONS OF DETECTION:
Taxonomy of anomaly detection system


fuzzy logic


Bayes theory


Artificial Neural networks


Support vector machine


Evolutionary
computation


Association rules


Clustering



(9)


ARCHITECTURE AND IMPLEMENTATION:
Centralized


Distributed


Cooperative Intrusion
Detection
-

Tiered architecture



(8
)


JUSTIFYING INTRUSION

DETECTION
:
Intrusion detection in security


Threat Briefing


Quantifying risk


Return on Investment (ROI)



(4)


APPLICATIONS AND TOO
LS:

Tool Selection and Acquisition Process
-

Bro Intrusion Detection


Prelude Intrusion Dete
ction
-

Cisco Security IDS
-

Snorts Intrusion Detection


NFR security



(9)


LEGAL ISSUES AND ORG
ANIZATIONS STANDARDS
:
Law Enforcement / Criminal
Prosecutions


Standard of Due Care


Evidentiary Issues, Organizations and Standardizations
.


(3)



Tot
al 42





REFERENCES:




1.

Ali A. Ghorbani
,
Wei Lu
, “
Network Intrusion Detection and Prevention
: Concepts and
Techniq
ues”, Springer, 2010.


24


2.

Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw
Hill, 2004

3.

Paul E. Proctor, “The Practical Intrusion Detection Handbook “,Prentice Hall , 2001.

4.

Ankit Fadia and Mnu Zacharia, “Intrusiion Alert”,

Vikas Publishing house Pvt., Ltd, 2007.

5.

Earl Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education,
2006.




09NB17 SPEECH PROCES
SING












3 0 0 3




SPEECH SIGNAL MODELLING
:
Speech signal characteristics and classifi
cations
-

Speech
production mechanism
-

Acoustic Theory of speech production
-

Source


Filter model
-

Lossless
Tube Models
-

Digital Model of speech signals















(10)


SPEECH SIGNAL ANALYSIS
:

Time domain Analysis for speech proces
sing


Short time energy
and magnitude
-

short time average zero crossing
-

Speech vs silence discrimination
-

Pitch
period estimation using autocorrelation
-

Short time Fourier analysis
-

Definition and properties
-

Design of digital filter banks
-

Pitch d
etection
-

analysis by synthesis



(12)


SPEECH CODING
:

Linear pred
ictive coding
-

principle
-

solution of LPC equation
-

Cholesky
decomposition method
-

Durbin's method
-

Lattice formulation

Frequency domain coding


Model based coding


LPC residual coding


(10)


SPEECH RECOGNITION
:
Template training method
-

Hidden Markov Model
-

Gaussian Mixture
model
-

connected word recognition
-

Speaker identification/Verification.


(10)












Total 42


REFERE
NCES
:


1.

Rabiner L R and Schaffer R W, "Digital Processing of Speech Signals", Prentice
-
Hall,
Englewod
-

Clitts, New Jersey, 1986.

2.

Rebner L R K and Juang B H, "Fundamentals of Speech Recognition", Pearson Education,
First Indian reprint 2003.

3.

Kondoz, "Dig
ital Speech", John Wiley and Sons Ltd., 1994.

4.

Thomas F Quatieri, “Discrete Time Speech Signal Processing”, Pearson Education, 2002.

5.

John R Deller, John Hansen and Proakis J G, ” Discrete Time Processing of Speech
Signals”, IEEE Press, 1999.








25


09NB18

PATTERN RECOGNITION

3 0 0 3


INTRODUCTION
:
Basic Concepts of Pattern Recognition
-

Fundamental problems in Pattern
Recognition System Design
-

Design Concepts and Methodologies


Examples of Automatic
Pattern Recognition Systems




(
6)


PATTERN
CLASSIFICATION BY DISTANCE FUNCTIONS
: Minimum Distance Pattern
Classification


Cluster Seeking


Unsupervised Pattern Recognition









(7)


PATTERN CLASSIFICATION BY LIKELIHOOD FUNCTIONS:


Introduction


Pattern
Classification as a Statistica
l Decision Problem


Bayes Classifier for Normal Patterns
-

Nonparametric decision making





(10)




PATTERN PREPROCESSIN
G AND FEATURE SELECT
ION:


Similarity and Distance


Clustering Transformations and Feature Ordering


Clustering in F
eature Selection


Feature
selection through Divergence Maximization


Binary Feature Selection




(10)


CASE STUDIES IN PATT
ERN RECOGNITION:


Clustering


Artificial Neural Networks


Image
Analysis


(
9)











Total 42

REFERENCES:

1.

Earl Gose, Richard Johnsonbaugh and Steve Jost,”Pattern Recognition and Image Anal
ysis”,
Prentice Hall, New Delhi, 2005.

2.

Earl Gose Richard Johnsonbaugh Steve Jost, “Pattern Recognition And Image Analysis”,
Prentice Hall, Inc, 2002

3.

Wolff D D Parsons M L, “Pattern Recognition Approach To Data Interpretation”, Plenum
Press, 1983
.

4.


Julius T
. Tou and Rafael C. Gonzalez, "Pattern Recognition Principles”, Addison Wesley,
New Delhi, 1974




09NB19 INFORMATION T
HEORY AND
CODING

3 0 0 3

RANDOM VARIABLES AND PROCESSES
:

Events
-

Random variables
-

Distribution and
density functions
-

Operations o
n random variables
-

Covariance
-

Correlation functions
-

Random process
-

Stationarity
-

Spectral decomposition
-

Response of linear system to
random inputs,
Relation between information and probability

(10)


INFORMATION ENTROPY
FUNDAME
NTALS:

Self information measure
-

mutual and self
information
-

Entropy function

-

Characteristics of Entropy function
-

Conditional Entropies
-

Derivation of the noise characteristics of a channel
-

Redundancy
-

Efficiency and channel
capacity
-

capacitie
s of channels with symmetric noise structure.
Huffman coding:
Implementation of Huffman code, Shannon's theorem, Code design, Shannon
-

Fano coding.
(10)


ERROR CONTROL CODING

:
Backward error correction linear block codes, BCH cod
es, Golay
codes, efficiency of LBC, forward correction codes
-
Convolution coding decoding algorithms,
Viterbi decoding optimum decoding performance measures



(8)


26





DATA AND VOICE CODING:

Context dependent coding, arithmetic codes, overall efficiency
consideration. Voice coding, Delta Modulation and adaptive delta modulation, linear predictive
coding, silence coding, sub
-
band coding (8)


COMPRESSION TECHNIQUE
S:
Principles


Text compression

Static Huffman Coding
-

Dynamic Huffman coding. Arithmetic coding


Image Compression


Graphics Interchange
format


Tagged Image File Format


Digitized documents


Introduction to JPEG standards.

(6)




Total 42

REFERENCES:

1.

Reza F M, "An Introduction to Information Theory", McGraw Hill, 2000.

2.

Viterbi A and Omura J K, "Principles of Digital Communication and

Coding", McGraw Hill,
1979.

3.

Cover T M and Thomas J A, “Elements of Information theory”, 2nd edition, John Wiley &
Sons, 2006.

4.

Sheldon M Ross, “Introduction to Probability Models”, Academic Press, 2003

5.

Roth R, “Introduction to Coding theory”, Cambridge
University Press, 2006.

6.

Peter Sweeney, “Error Control Coding: From Theory to Practice”, John Wiley & Sons, 2002.


09NB20

ARTIFICIAL INTELLIGENCE



3 0 0 3




INTRODUCTION
:
Artificial Intelligence


History

The state of art
-

Intelligent Agents


Structu
re


Environment. (3)


SEARCH STRATEGIES:


Breadth
-
first search
-

Uniform cost search
-

Depth
-
first search
-

Depth
-
limited search
-

Iterative deepening search
-

Bidirectional search
-

Heuristic search techniques
-

Comparing search strategies.




(6)



KNOWLEDGE AND REASON
ING
:
Representation


Logic


Propositional logic


Using
predicate logic, using rules
-

Forward and backward chaining

Strong and weak slot fillers.






(8)


PLANNING
:

Overview
-

An example domain
-

Components
-

Goal S
tack planning
-

Non
-
linear
planning
-

Hierarchical planning
-
Reactive systems.











(7)


UNCERTAINTY
:
Non
-
monotonic reasoning
-

Logics
-

Implementation
-

Probability and Bayes
theorem
-

Certainty factors
-

Bayesian networks
-

Dempster
-

Shafer t
heory.








(6)


NATURAL LANGUAGE PRO
CESSING:
Phases
-

Syntactic Processing
-
Semantic Analysis
-
Discourse and Pragmatic Processing.












(4)


LEARNING:


Introduction
-

Learning by Taking Advice
-

Learning

in problem solving
-

Inductive
learning
-

Learning decision trees
-
Explanation
-
based learning
-
Formal learning
-
Learning in Neural
and Belief Networks.



(4)



27


EXPERT SYSTEMS:
Features


Characteristics
-
Architecture
-
Basic Activities
-
Stages in
developm
ent
-

Structure of a knowledge base


Probability based Expert Systems
-

Tools.


(4)




Total 42


REFERENCES:

1.

Stuart Russell and
Peter Norvig, “Artificial Intelligence


A Modern Approach”, Prentice Hall
of India, Second Edition, New Delhi, 2008.

2.

Elaine Rich and Kevin Knight, “Artificial Intelligence”, Tata McGraw Hill Publishing Company,
New Delhi, 2005.

3.

Dan W


Patterson, “Introdu
ction to AI and Expert Systems”, Prentice Hall of India, New Delhi,
2006.

4.

Eugene Charniak, Drew McDermott, “Introduction to Artificial Intelligence”, Pearson
Education, New Delhi, 2006.

5.

Nils J Nilsson, “Principles of Artificial Intelligence”, Narosa Publi
shing House, New

Delhi,
2005.


6.

N P Padhy, “Artificial Intelligence and Intelligence Systems”, Oxford University Press, 2006







09NB21 DISTRIBUTED COMPONENT AND ENTERPRISE SYSTEM


3 0 0 3

INTRODUCTION:


Review of Object Oriented Technology


RP
C Concepts, ActiveX and OLE
concepts, Component concepts , Benefits , Requirements


Basic Distributed Objects


Methods
of Distribution, Introduction to Grid computing


the next generation distributed computing



(5)


CORBA:


COR
BA Overview


Object Management Group


Object Management Architecture


CORBA Architecture


ORB Structure


OMG IDL


ORB and Object Interfaces


Object
Adapter, Basic Object Adapter


Portable Object Adapter


Language Mappings


Dynamic
Invocation and
Dynamic Skeleton Interface


BOA Vs POA


GIOP


IIOP


CORBA Services


(12)


COM/DCOM:


Fundamental Programming Architecture: From OLE to DCOM


COM
Background


COM Interfaces


Types of Components


COM library.


IUnknown and
IClassFactory


Type

Libraries


Threading models and Apartments


Monikers


DLL
Surrogates and Executable Components, Marshalling


Introduction to Distributed COM, COM+
and .NET



(10)


ENTERPRISE FOUNDATIONS:

Enterprise Architectural overview, Object oriented softw
are’s
importance for Enterprise


Enterprise Concepts


Component Models


Component Based
Development and Standards


Java Enterprise System Architecture with J2EE




(4)


SERVICES FOR DISTRIBUTED ENTERPRISE SYSTEMS:

Na
ming Services, Overview,
CORBA Naming


DCOM Naming.


Directory and trading services: CORBA Trading Service.


Activation Services: CORBA Activation Framework


DCOM Activation Framework.


Messaging
Services: Messaging Overview


CORBA Messaging. Introducti
on to Transaction Services and
Security services









(6)


28



SERVICE ORIENTED ARCHITECTURE:

Introduction to web services


SOA, Business value
of SOA


Architecture elements





(5)


Total 42

REFERENCES:


1.

Paul J Perrone , Venkata S.R. Krishna, Chayanti.R, " Building Java Enterprise Systems with
J2EE" ,Techmedia, New

Delhi, 2000.

2.

Andreas Vogel, Vasudevan.B, Benjamin.M and Ted Villalba, “C++ Programming with

CORBA”, John Wiley & Sons,

New York, 1999.

3.

Guy Eddon and Henry Eddon, "Inside Distributed COM", Microsoft Press, New Delhi, 1998.

4.

Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones, Rawn Shah, "Service
Oriented Architecture (SOA) Compass" IBM p
ress, 2005.

5.

Dirk Slama, Jason Garbis and Perry Russel,” Enterprise CORBA”, Prentice Hall, New Jersey,
1999.

6.

Dale Rogerson, "Inside COM", Microsoft Press, New Delhi, 1997.


09NB22

ETHICAL HACKING

AND NETWORK DEFENSE

3 0 0 3


ETHICAL HACKING OVERVIEW:

Intro
duction
-

Certified Ethical Hackers


Network and
Computer Attacks


Ethical Hacking Plan


Hacking Methodology.






(5)


FOOTPRINTING AND SOCIAL ENGINEERING:

Footprinting Tools


Conducting Competitive
Intelligence
-

DNS Zone Transfers


Introduction to Social Engineering


Performing Social
Engineering Attacks
-

Social Engineering Countermeasures.

(6)


SERVICE SCANNING:

Introduction to Port Scanning


Types of Port Scan


Port Scanning
Tools
-

Conducting Ping Sweeps
-

Shell Scripting. Enumeration: Introduction
-

Enumerating
Windows, Symbian, Java OS, Android and NetWare Operating Systems.



(8)


HACKING NETWORKS:

Hacking Web Servers: Web Application


Web Application
Vulnerabilities


Tools for Web Attackers and Security Testers. Hacking Wireless Network:
Wireless Technology


Wireless Network Standards


Authentication


Wardriving


Wi
reless
Hacking


Protecting Networks with Security Devices.

(8)


HACKING OPERATING SYSTEMS:

Windows: Vulnerabilities


Choosing Tools


Information
Gath
ering


RPC


Null Sessions


Share Permissions


Hardcore Vulnerability Exploitation.
Linux: Vulnerabilities


Information Gathering


Unconnected Services
-

.rhosts and hosts.equiv
Files


NFS


File Permissions


Buffer Overflow.

(8)



HACKING APPLICATIONS:

Messaging Systems


Web Applications


Mobile Applications
-

Databases
-

Reporting Results.




(7)


Total 42

REFERENCES:

1.

Michael T. Simpson, “Ethical Hacking and Network Defense”, Cengage Learning, New
Delhi,

2010.


29


2.

Kevin Beaver, “Hacking for Dummies”, Wiley Publication, India, 2007.

3.

Ankit Fadia, “Unofficial Guide to Ethical Hacking”, Macmillan Company, New Delhi, 2001.






09NB51 BIOMETRIC SIGNAL PROCESSING LABORATORY

0 0 3 2

List of Experiments

1.

Image Enhance
ment

2.

Image Segmentation

3.

Image Acquisition
-

Fingerprint

4.

Feature Extraction
-

Fingerprint

5.

Image Acquisition
-

Face

6.

Feature Extraction
-

Face

7.

Image Acquisition
-

Iris

8.

Feature Extraction
-

Iris

9.

Multimodal Biometrics
-

Serial

10.

Multim
odal Biometrics
-

Parallel


09NB52 CYBER SECURITY LAB
ORATORY

0 0 3 2


1.

Implementation of Substitution and Transposition ciphers

2.

Implementation of Data Encryption Standard

3.

Implementation of International Data Encryption Algorithm

4.

Implementation of Advanced

Encryption Standard

5.

Implementation of RSA Algorithm

6.

Implementation of Diffie
-
Hellman Key Exchange

7.

Implementation of Message Authentication Codes

8.

Implementation of Hash functions

9.

Implementation of Digital Signature Standard

10.

Hiding of confidential informat
ion within Image







30


09NB53 DATABASE SECURITY LAB
ORATORY

0 0 3 2

1.

Creating a database for an application using DDL.

2.

Setting up of integrity constraints.

3.

Data manipulation using DML queries.

4.

Use Rollback, commit, savepoint, grant and revoke commands.

5.

Creati
on, deletion and modification of users and implementing authentication mechanisms
for different users.

6.

Designing and implementing password policies.

7.

Creating, assigning and revoking user roles.

8.

Implementing a Virtual private database.

9.

Auditing database act
ivities with Oracle.

10.

Security auditing with SQL Server.


0
9NB55 OBJECT COMPUTI
NG AND DATA STRUCTUR
ES LABORATORY


2 0 3 4

PRINCIPLES OF OOP:

Programming paradigms, basic concepts and benefits of OOP,
applications of OOP.



(2)












INTRODUCTION TO C++:

History of C++, structure of C++, basic data types, derived data
types
, symbolic constants, dynamic initialization, type modifiers, type casting, operator and
control statements, input and output statements.



(3)


CLASSES AND OBJECTS:
Class specification, member function specification , scope resolution
operator, access

qualifiers, instance creation, member functions, function prototyping, function
components, passing parameters, call by reference, return by reference, inline function, default
arguments, overloaded function. Array of objects, pointers to objects, this
pointer, dynamic
allocation operators, dynamic objects. Constructors, parameterized constructors, overloaded
constructors, constructors with default arguments, copy constructors, static members and static
objects as arguments, returning objects, friend fun
ction and friend class.





(7)





OPERATOR OVERLOADING:
Operator function, overloading unary and binary operator,
overloa
ding the operator using friend function.







(2)


INHERITANCE:

Defining derived class, single inheritance, protected dat
a with private
inheritance, multiple inheritance, multi level inheritance, hierarchical inheritance, hybrid
inheritance, multi
-
path inheritance, constructors in derived and base classes, abstract classes.








(5)


INTRODUCTION TO DATA STRUCTURES:

Abstract data types, primitive data structures,
analysis of algorithms, notation.









(5)



31


ARRAYS:

Operations, implementation of one, two and multi dimensioned arrays, different types
of array applications.








(5)


STRINGS:

Implementation, Operations, applications.







(3)


STACKS:
Primitive operations, sequential implementation, applications. Recursion definition,
process and implementation using stacks, evaluation of expressions.





(3)


QUEUES: Primitive

operations, sequential implementation, applications. Priority queues,
dequeues.




(3)







SORTING:
Insertion sort, selection sort, bubble sort, heap sort, radix sort algorithms and
analysis.



(4)














Total 42


REFERENCES
:

1.

Bjarne Stroustrup, “The C++ Programming Language”, Addison Wesley, 2004.

2.

Stanley B Lippman and Josee Lajoie, “The C++ Primer”, Addison Wesley, 2005.

3.

Harvey M Deitel
,and
Paul J. Deitel
, “
C++ How to Program”,
Prentice Hall,

2007.

4.


Aaron M T
anenbaum, Moshe J Augenstein and Yedidyah Langsam, “Data


structures using
C and C++”, Prentice


Hall of

India, 2005.

5.

Sahni Sartaj, “Data Structures, Algorithms and Applications in C++”,

Universities Press,
2005.

6.

Nell Dale, “C++ Pl
us Data Structures”, Jones and Bartlett, 2006.

7.


Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Addison
-

Wesley,
2006.

8.

Robert L Kruse and Clovis L Tondo, “ Data Structur
es and Program design in
C”, Pearson
Education, 20
05.