09NB01 MATHEMATICAL FOUNDATIONS FOR CYBER SECURITY 3 1 0 4 NUMBER THEORY:

AI and Robotics

Oct 16, 2013 (4 years and 8 months ago)

123 views

13

09NB01 MATHEMATICAL FOUNDATIONS FOR CYBER SECURITY

3 1 0 4

NUMBER THEORY:
Introduction
-

Divisibility
-

Greatest common divisor
-

Prime numbers
-

Fundamental theorem of arithmetic
-

Mersenne primes
-

Fermat numbers
-

Euclidean algorithm
-

Fermat’s theo
rem
-

Euler totient function
-

Euler’s theoerem.
Congruences:
Definition
-

Basic
properties of congruences
-

Residue classes
-

Chinese remainder theorem.

(10)

ALGEBRAIC STRUCTURES:

Groups

Cyclic groups, Cosets, Modulo groups
-

Primitive roots
-

Discrete logarithms.

Rings

Sub rings, ideals and quotient rings, Integral domains.
Fields

Finite
fields

GF (p
n
), GF(2
n
)
-

Classification
-

Structure of finite fields. Lattice, Lattice as Algebraic
system, sub lattices, some special lattices.

(12)

PROBABILITY THEORY:
Introduction

Concepts of Probability
-

Conditional Probability
-

Bay
e’s
Theorem
-

Random Variables

discrete and continuous
-

central Limit Theorem
-
Stochastic
Process
-

Markov Chain.

(8)

CODING THEORY:

Introduction
-

Basic concepts: codes, minimum distance, equivalence of
codes, Linear codes

-

Linear codes
-

Generator matrices and parity
-
check matrices
-

Syndrome
decoding

Hamming codes
-

Hadamard Code
-

Goppa codes.

(6)

PSEUDORANDOM NUMBER GENERATION:
Introduction and examples
-

Indistinguishability of
Probability Distributions
-

Next Bit Predictors
-

The Blum
-
Blum
-
Shub Generator

Security of the
BBS Generator.

(6)

Total
42

REFERENCES:

1.

Ivan Niven, Herbert S. Zuckerman, and Hugh L. Montgomery, ‘An introduction to the theory of
numbers’, John Wiley and Sons 2004.

2.

Douglas Stinson, ‘Cryptography

Theory and Practice’, CRC Press, 2006.

3.

Sheldon M Ross, “Introduction to Probability Models”, Academic Press, 2003.

4.

C.L. Liu, ‘Elements of Discrete mathematics’, McGraw Hill, 2008.

5.

Fraleigh J. B., ‘A first course in abstract algebra’, Narosa, 1990.

6.

Joseph A. Gallian, ‘’Contemporary Abstract

Algebra’, Narosa, 1998.

09NB02 COMPUTER ARCHITECTURE AND SECURITY ANALYSIS

3 0 0 3

INTRODUCTION
: Register Transfer language

Register, Bus and Memory Transfers
-

Arithmetic
Logic and Shift Micro operations.

Instruction codes

Instructions

Timing and Control

Instruction Cycle

Input, output and Interrupt

(8)

14

CENTRAL PROCESSOR ORGANIZATION
: Instruction Formats

Addressing Modes
-

Program
Control

Control Memory

(5
)

MEMORY AND INPUT/OUTPUT ORGANIZATION:

Basic Concepts

Memory Hierar
chy

Main
Memory

Cache and Virtual Memory Concepts

Input / Output Interface

Direct memory
Access

I/O Processor.

(8)

INRODUCTION TO PARALLEL PROCESSING:

Parallelism
-

pipelining
-

pipeline hazards.
Memory interleaving

-

Parallel computer architecture classifications.

Introduction to CISC and
RISC Processors

(6)

SECURITY ANALYSIS:
Basic components of Security
: Confid
entiality, Integrity, Availability,
Threats. Security policies, types , role of trust, types of access control

(5)

AUTHENTICATION:
Basics,

Passwords: attacking,
countering,

pass
word ageing

Biometrics

(5)

CONFINEMENT PROBLEM:
Introduction, isolation: virtual machines, sandboxes, covert

channels, detection analysis , mitigation

(5)

Total 42

REFERENCES:

1.

Morris Mano M, “Computer System and Architecture”, Pearson Education, New Delhi, Third
edition, 2004.

2.

D. Patterson and J. Hennessy, “Computer Organization and Design:

The Hardware/Software
Interface”, Morgan Kaufmann Publishers, Inc., Third edition, 2002.

3.

Kai Hwang and Briggs F.A., “Computer Architecture and Parallel Processing”, McGraw Hill
International Edition,

New Delhi, 2007.

4.

Matt Bishop, “Computer Security”, Pea
rson Education, New Delhi, 2003.

5.

Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas
Publishing House, New Delhi, 2003

6.

Micki Krause, Harold F. Tipton, “ Handbook of Information Security Management”, Vol 1
-
3
CRC Press LLC, 2
004

09NB03 INTERNETWORKING AND TCP/IP

3 0 0 3

INTRODUCTION
:

Networking basics
-

LANs and WANs
-

Network hardware components,
Server
-
base
d networks
-

Peer
-
to
-
peer networks
-

Server
-
based vs. peer
-
to
-
peer networks
-

Specialized servers
-

Combination networks
-

Network packets

Addressing packets

Multiplexing
-

Protocols
-

The OSI reference model

Internet Protocol Stack.

(8)

DATA LINK CONTROL:
Asynchronous and Synchronous transmission
-

MAC protocol;
Controlled & contention
-
based
-

IEEE 802.11 LANs

System architecture, physical layer, Media
Access Control

MAC management

Error
Detection and Correction Techniques

CRC and
Linear Block Codes

Transmission Protocols

Retransmission techniques

-
Token ring

FDDI.

(9)

TRANSPORT LAYER:
Introduction to TCP

packet format

sliding window protocol

Establi
shing

and Closing TCP connection

Response to Congestion and variance in delay

TCP performance

Reserved and available port numbers.

(8)

15

NETWORK PROTOCOLS
:

IP Layers and functions

Versions, IP Addressing

classful
addressing , classless addressing, Delivery, Forwarding and Routing of IP packets, ARP, RARP,
Internet Protocol, Datagram, Fragmentation, IP Pa
ckets, ICMP, IGMP, User Datagram Protocol.

(12)

NETWORK SECURITY
:

Cryptography, Privacy, Digital Signature, IPSec, Transport Layer
Security, Application Layer Security, Firewalls.

(5)

Total 42

REFERENCES:

1.

Fitzgerald and Dennis, “Business Data Communications and Networking”, John Wiley and
Sons, Delhi, 2005.

2.

William Stallings, “Data and Computer Communications
”, Eighth edition, Prentice Hall, New

Delhi, 2006.

3.

James F Kurose, et al, “Computer Networking: A Top
-
Down Approach Featuring the
Internet”, Fourth edition, Addison Wesley, 2008.

4.

Achyut S Godbole, “Data Communications and Networks”, Tata Mc
-
Graw
Hill, 2002.

5.

Ferouzan, “Data Communications and Networking”, Tata Mc
-
Graw Hill, 2006.

09NB04 BIOMETRIC SYSTEMS

3 0 0 3

INTRODUCTION:
Biometric fundamentals

Biometric technologies

Biometrics Vs traditional
techniques

Characteristics of a go
od biometric system

Benefits of biometrics

Key biometric
processes: verification, identification and biometric matching

Performance measures in
biometric systems: FAR, FRR, FTE rate, EER and ATV rate.

(9)

PHYSIOLOGICAL BIOMETRICS :
Leading technologies :

Finger
-
scan

Facial
-
scan

Iris
-
scan

Voice
-
scan

components, working principles, competing technologies, strengths and
weaknesses

Other physiological biometrics

: Hand
-
scan, Retina
-
scan

components, working principles, competing technologies, strengths and weaknesses

Automated fingerprint identification systems.

(12)

BEHAVIOURA
L BIOMETRICS:
Leading technologies:

Signature
-
scan

Keystroke scan

components, working principles, strengths and weaknesses.

(4)

BIOMETRIC APPLICATIONS:
Categorizing biometric applications

application areas: criminal
and citizen identification, surveillance, PC/network access, e
-
commerce and retail/ATM

costs to
deploy

other issues in deployment (9)

PRIVACY AND STANDARDS IN BIOMETRICS
: Assessing the Privacy Risks of Biometrics

Designing Privacy
-
Sympathetic Biometric Systems

Need for standards

different biometric
standards.

(8)

Total 42

16

REFERENCES:

1.

Samir Nanavati, Michael Thieme, Raj Nanavati, “Biometrics

Identity

Verification in a Networked World”, Wiley
-
dreamtech India Pvt Ltd, New Delhi, 2003

2.

Paul
Reid, “Biometrics for Network Security”, Pearson Education, New Delhi, 2004

3.

John R Vacca, “Biometric Technologies and Verification Systems”, Elsevier Inc, 2007

4.

Anil K Jain, Patrick Flynn, Arun A Ross, “Handbook of Biometrics”, Springer, 2008

09NB05
ADVA
NCED DATA STRUCTURES

3 1 0 4

INTRODUCTION :
Primitive operations in a linked list
-
Tree definitions and representations

Tree Traversals

Graph
definitions and representations

Graph traversals

Shortest path
algorithms

(8)

SEARCHING :
Linear search

Binary search
-

Binary search trees

AVL search trees

Red
-
Black trees

B trees
-

B+ trees

Tries

Hashing and collision resolution

(8)

COMPLEXITY ANALYSIS:

A
nalysis framework

Asympto
tic notations and basic efficiency
classes

Mathematical analysis of non
-
recursive and recursive algorithms. Divide and Conquer:
The general method

Binary search analysis

Quick
-
sort analysis

Merge sort analysis.

(8)

GREEDY METHOD:

The general method
-

Knapsack problem
-

Minimum spanning trees : Prim’s
algorithm, Kruskal’s algorithm.

Dynamic Programming: The general method : Overlapping sub
-
problems, Optimal substructure, Memorization
-

Knapsack problem
-

Optimal binary search tree.

(9)

BACKTRACKING:

The general method : State
-
space tree for fixed and variable size tuples
-

Knapsack problem
-

n queens problem. B
ranch and Bound: The general method : LC Search,
Bounding, FIFO branch and bound, LC branch and bound
-

Knapsack problem
-

Travelling
salesperson problem.

(9)

Total 42

REFERENCES:

1.

Anany Levitin, “Int
roduction to the Design and Analysis of Algorithms”, Pearson Education, New
Delhi, 2007.

2.

Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, “Fundamentals of Computer
Algorithms”, Galgotia Publications, New Delhi, 2008.

3.

Adam Drozdet, “Data Structures

and Algorithms in C++”, Cengage Learning, New Delhi, 2010.

4.

Mark Allen Weiss, “Data Structures and Problem Solving using Java”, Addison Wesley, USA,
2006.

09NB06 APPLIED CRYPTOGRAPHY

3 0 0 3

INTRODUCTION:
Cryptography

and

modern
cryptography

The set
ting of private
-
key encryption

Historical ciphers and their cryptanalysis

Basic principles of modern cryptography

Services,
Mechanisms and Attacks

OSI security architecture.

(5)

17

SYMMETRIC

TECHNIQUES:

Definition

S
ubstitution ciphers

Transposition ciphers
-

Stream
and block ciphers
-

A5, RC4 .Characteristics of good ciphers

-

Data Encryption Standard
(DES)

International Data Encryption Algorithm

Advanced Encryption Standard

Block cipher
modes of operation

Confidentiality using symmetric encryption. (11)

ASYMMETRIC TECHNIQUES:
Principles of Public Key Cryptosystems

The RSA Algorithm

Key Management

Diffie Hellman Key Exchange

Elliptic Curve Cryp
tography

over reals,
prime fields and binary fields, Applications, Practical considerations. Cryptography in Embedded
Hardware

(9)

MESSAGE AUTHENTICATION:

Authentication requirements

Authentication functions

Messa
ge Authentication Codes (MAC)

Hash functions

Security of hash functions and MACs.
(8)

HASH AND DIGITAL SIGNATURES:

MD5 Message Digest Algorithm

Secure Hash Algorithm
(
SHA)

RIPMED160
-

HMAC
-

Digital Signatures
-

Authentication Protocols
-

Digital Signature
Standard (DSS) (9)

Total 42

REFERENCES:

1.

Bernard Menezes, “Network Security and Cryptography”, Cengage Learning, New Delhi,
20
10.

2.

Ingemar J.Cox, Matthew L.Miller, Jeffrey A.Bloom, Jessica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Morgan Kaufmann Publishers, New York, 2008.

3.

William Stallings, “Cryptography and Network Security, Prentice Hall, New Delhi, 2006
.

4.

Wenbo Mao, “Modern Cryptography

Theory and Practice”, Pearson Education, New Delhi,
2006.

5.

Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography”, Chapman &
Hall/CRC, New York, 2007.

6.

Bruce Schneier,

“Applied Cryptography”, John Wiley & So
ns, New York, 2004.

09NB07 DATABASE DESIGN AND SECURITY

3 1 0 4

INTRODUCTION:

Data models, structure of relational databases, component of management
system

DDL, DML
, database

languages, SQL standard, database users and administrators.

(6)

RELATIONAL DBMS:

Design issues
-

basic normal forms and additional normal forms,
Transforming E
-
R diagram to relations, Integrity constraints, Query processing and optimization

(9)

TRANSACTION PROCESSING:

Transaction concept, concurrent execution, isolation, testing for
serializability, Concurrency control, lock based
-

time
-
stamp based
-

validation bas
ed protocols,
multi
-
version schemes, deadlock handling.

(9)

DATABASE SECURITY:
Introduction to database security, security models, physical and logical
security, security requirements, reliability and integrity, s
ensitive data, inference, multilevel
databases and multilevel security, access control
-

mandatory and discretionary , security
architecture, issues.

(9)

SECURITY ISSUES:
Application access, security and authorization, authoriza
tion in SQL,
encryption and authentication, secure replication mechanisms, Audit
-

logon/logoff, sources,

18

usage and errors, changes, external audit system architecture, archive and secure auditing
information

(9)

Total 42

REFERENCES:

1.

Abraham Silberschatz, Hanry F Korth, Sudarshan S, “Database Systems Concepts”,
McGraw Hill, 2007.

2.

Ron Ben Natan, “Implementing database security and auditing”, Elsevier publications,
2005.

3.

Hassan A. Afyduni, “Da
tabase Security and Auditing”, Course Technology

Cengage
Learning, NewDelhi, 2009.

4.

Raghu Ramakrishnan, "Database Management Systems", McGraw Hill/ Third Edition,2003

5.

Ramez Elmasri, Shamkant B. Navathe , “Fundamentals of Database System” Addison
Wesley,

New Delhi/Fourth Edition 2004

6.

M. Gertz, and S. Jajodia, Handbook of Database Security
-

Application and Trends, 2008,
Springer.

09NB08 BIOMETRIC IMAGE PROCESSING

3 1 0 4

FUNDAMENTALS:

Digital Image representation
-

Fundamental steps in Image Processing

-

Elements of Digital Image Processing Systems
-

Sampling and Quantization
-

Basic relationships
between pixels
-

Imaging Geometry
-

Transformation Technology
-

The Fourier Transform, The
Hadamard Transform, The Discrete Cosine Transform.

(7)

IMAGE PROCESSING METHODS:
Image Enhancement: The Spatial Domain Methods, The
Frequency Domain Methods
-

Image Segmentation: Pixel Classification by Thresholding,
Histogram Techniques, Smoothing and Thresholding
-

Gradient Based Segmentation:
Gradien
t
Image, Boundary Tracking, Laplacian Edge Detection.

(7)

FINGERPRINT BIOMETRICS:

Fingerprint Patterns, Fingerprint Features, Fingerprint Image,
width between two ridges
-

Fingerpr
int Image Processing
-

Minutiae Determination
-

Fingerprint
Matching: Fingerprint Classification, Matching policies. (7)

FACE RECOGNITION:

Detection and Location of Faces: Statistics
-
Based method, Knowledge
-
Based method
-

Featur
e Extraction and Face Recognition: Gray value Based method, Geometry
Feature Based method, Neural Networks method.

(7)

IRIS BIOMETRICS:

Iris System Architecture, Definitions and Notations
-

Iris Recognition: Iris
location, Doubly

Dimensionless Projection, Iris code, Comparison
-

Coordinate System:
Head
Tilting Problem, Basic Eye Model, Searching Algorithm
-

Texture Energy Feature.

(7)

FUSION IN BIOMETRICS:

Introduc
tion to Multibiometrics
-

Information Fusion in Biometrics
-

Issues in Designing a Multibiometric System
-

Sources of Multiple Evidence
-

Levels of Fusion in
Biometrics
-

Sensor level , Feature level, Rank level, Decision level fusion
-

Score level Fusio
n.

(7)

Total 42

REFERENCES:

1.

David D. Zhang, “Automated Biometrics: Technologies and Systems”, Klu
wer Academic
Publishers, New Delhi, 2000.

2.

Rafael C.Gonzalez, Richard E.Woods, Steven L.Eddins, “Digital Image Processing”,
Pearson Education, New Delhi, 2009

3.

Arun A. Ross , Karthik Nandakumar, A.K.Jain, “Handbook of Multibiometrics”, Springer,
New Delhi
, 2006

19

09NB09 CYBERCRIME INVESTIGATIONS AND DIGITAL FORENSICS

3 0 0 3

INTRODUCTION:

Introduction and Overview of Cyber Crime, Nature and Scope of Cyber Crime,
Types of Cyber Crime: Social Engineering, Categories
of Cyber Crime, Property Cyber Crime.

(6)

CYBER CRIME ISSUES
:

Unauthorized Access to Computers, Computer Intrusions, White collar
Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Porn
ography,
Software Piracy, Intellectual Property, Mail Bombs, Exploitation ,Stalking and Obscenity in
Internet, Digital laws and legislation, Law Enforcement Roles and Responses.

(9)

INVESTIGATION:

Introduction to Cyber Crime Investiga
tion, Investigation Tools, eDiscovery,
Digital Evidence Collection, Evidence Preservation, E
-
Mail Investigation, E
-
Mail Tracking, IP
Tracking, E
-
Mail Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search
and Seizure of Computers, Reco
vering Deleted Evidences, Password Cracking.

(9)

DIGITAL FORENSICS:

Introduction to Digital Forensics, Forensic Software and Hardware,
Analysis and Advanced Tools, Forensic Technology and Practices, Fo
rensic Ballistics and
Photography, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System
Forensics, Linux System Forensics, Network Forensics. (9)

LAWS AND ACTS:

Laws and Ethics, Digital Evidence Controls, Evidence Handling Procedures,
Basics of Indian Evidence ACT IPC and CrPC , Electronic Communication Privacy ACT, Legal
Policies.

(9)

Total 42

REFERENCES:

1.

Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage
Learning, New Delhi, 2009.

2.

Kevin Mandia, Chris Prosise, Matt Pepe, “Incident Response and Computer Forensics “, Tata
McGraw
-
Hill, New Delhi, 20
06.

3.

Robert M Slade,” Software Forensics”, Tata McGraw
-

Hill, New Delhi, 2005.

4.

Bernadette H Schell, Clemens Martin, “Cybercrime”, ABC

CLIO Inc, California, 2004.

5.

”Understanding Forensics in IT “, NIIT Ltd, 2005.

09NB11 OPERATING SYSTEM AND ITS SEC
URITY

3 0 0 3

INTRODUCTION:

Operating system concepts

Functions

Structure of Operating system

Types of operating system.

20

(4)

PROCESS MANAGEMENT:

Introduction to processes

Process Scheduling
-

Threads
-
CPU
Scheduling objectives, criteria

Typ
es of scheduling algorithms

Performance comparison

Inter process communications
-

Synchronization

Semaphores

Dead lock Prevention,
Recovery, Det
ection and Avoidance

(10)

MEMORY MANAGEMENT:

Single contiguous allocation

Partitioned allocation

Paging

Virtual
memory concepts

Swapping

Demand paging

Page replacement algorithms

Segmentation.

(10)

DEVICE AND FILE MANAGEMENT:
Pr
inciples of I/O hardware

I/O software

Disks

Disk
Scheduling Algorithms
--
File Systems
-

Files and Directories
-

File System Implementation
-

Allocation Methods.

(8)

SECURITY ISSUES:

Protection in Ge
neral Purpose Operating Systems: protected objects and
methods of protection

memory and address protection

control of access to general objects

file protection Mechanisms

user authentication
-

Designing Trusted Operating Systems.

(10)

Total 42

REFERENCES:

1.

Silberschatz A, Galvin P, Gagne G, "Operating Systems Concepts", John Wiley & Sons,
Singapore,

2006.

2.

Michael Palmer, Guide to Operating Systems Security”, Course Technology

Cengage
Learning, New Delhi, 2008

3.

Charles P. Pleeger, "Security in
Computing", Prentice Hall, New Delhi, 2009

4.

Deitel H M, “Operating Systems ", PHI/ Pearson Education, New Delhi, 2004.

09NB12 NETWORK SECURITY

3 0 0 3

INTRODUCTION:

Network concepts

Threats in networks

Network security controls

Importance of secur
ity

Threat models

Security concepts

Common mitigation methods.

(4)

AUTHENTICATION:

Overview of authentication

Authentication of people

Security Handshake
pitfalls

Strong pass
word protocols

Kerberos

Public key infrastructure.

(10)

IP & WEB SECURITY
: IP security: Overview
-

Architecture

Authentication Header
-

Encapsulating Security Payload
-

Key management

Web security: Web security consideratio
ns

Secure Socket Layer and Transport Layer Security

Secure electronic transaction

Web
issues

(10)

ELECTRONIC MAIL SECURITY:

Store and forward

Security services for e
-
mail

Establishing
keys

Privacy

Authentication of the Source

Message Integrity

Non
-
repudiation

Proof of
submission and delivery
-

Pretty Good Privacy

Secure/Multipurpose Internet Mail Extension.

(8)

SYSTEM SECURITY:

Intruders

Intrusion detection

Password management

Malic
ious
software: Viruses and related threats

virus countermeasures

Firewalls: Firewall design
principles

Firewall configurations

Trusted systems

(10)

Total 42

21

REFERENCES:

1.

Charles P. Fleeger, "Security in Computing", Prentice Hall, New Delhi, 2009

2.

Behrouz A.Forouzan, “Cryptography & Network Security”, Tata McGraw Hill, India, New
Delhi, 2009.

3.

William Stallings, “Cryptog
raphy and Network Security, Prentice Hall, New Delhi, 2006.

4.

Chalie Kaufman, Radia Perlman, Mike Speciner, “Network Security: Private Communication
in a Public Network”, Pearson Education, New Delhi, 2004.

5.

Neal Krawetz, “Introduction to Network Security”,
Thomson Learning, Boston, 2007.

6.

Bruce Schneier,

“Applied Cryptography”, John Wiley & Sons, New York, 2004.

09NB13 DATA MINING

3 0 0 3

INTRODUCTION:

Motivation

Data Mining Functionalities

Classification on data mining
systems

Task Primitives

Major Issues
-

Data Preprocessing.

(4)

DATA WAREHOUSE AND OLAP:

Data warehouse

Multidimensiona
l data model

Data
Warehouse architecture

OLAP Technology

Data Cube Computation.

(8)

ASSOCIATION ANALYSIS:
Basic Concepts

Frequent Item set mining methods
-

Types of
association rules.

(7)

CLASSIFICATION:

Introduction

Statistics and Probability
-

Decision
Tree Induction

Bayesian Classification

Classification by Back propagation

Rule Based
Classification

Support Vector Machines.

(9)

CLUSTER ANALYSIS:

Partitioning methods

Hierarchical Methods

Density based methods
-

Neural Network Based Methods.

(8)

ADVANCED TOPICS:

Introduction to spatial data mining

Text Mining

Web Mining.

(6)

Total 42

REFERENCES:

1.

Jaiwei Han, Micheline Kamber, “Data Mining: Concepts and Techniques”, Elsevier, 2006.

2.

Rajan Chatt
amvelli, “Data Mining Methods”, Narosa, 2009.

3.

Pang
-
Ning Tan, Michael Steinbach, "Introduction to Data Mining", Addison Wesley, 2006.

4.

Margaret Dunham, “Data Mining: Introductory and Advanced Topics”, Pearson Education,
New Delhi, 2007.

5.

Alex Berson, “Data Wa
rehousing, Data Mining and OLAP,” Tata Mc Graw Hill , 2004

09NB14 DIGITAL WATERMARKING AND STEGANOGRAPHY

3 0 0 3

INTRODUCTION:

Information Hiding, Steganography and Watermarking

History of
watermarking

Importance of digital watermarking

Applic
ations

Properties

Evaluating
watermarking systems.

(6)

22

WATERMARKING MODELS & MESSAGE CODING:
Notation

Communications

Communication based models

Geometric models

Mapping messages into messag
e vectors

Error correction coding

Detecting multi
-
symbol watermarks.

(9)

WATERMARKING WITH SIDE INFORMATION & ANALYZING ERRORS:

Informed Embedding

Informe
d Coding

Structured dirty
-
paper codes
-

Message errors

False positive errors

False negative errors

ROC curves

Effect of whitening on error rates.

(8)

PERCEPTUAL
MODELS:

Evaluating perceptual impact

General form of a perceptual model

Examples of perceptual models

Robust watermarking approaches
-

Redundant Embedding,
Spread Spectrum Coding, Embedding in Perceptually significant coefficients

(7)

WATERMARK SECURITY & AUTHENTICATION:

Security requirements

Watermark security
and cryptography

Attacks

Exact authentication

Selective a
uthentication

Localization

Restoration. (7)

STEGANOGRAPHY
: Steganography communication

Notation and terminology

Information
-
theoretic foundations of steganography

Practical steganographic methods

Minimi
zing the
embedding impact

Steganalysis (5)

Total 42

REFERENCES:

1.

Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Margan Kaufmann Publishers,
New York, 2008.

2.

Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, “Digital Watermarking”, Margan
Kaufmann Publishers, New York, 2003.

3.

Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications of
Digital Watermarking and Cont
est Protection”, Artech House, London, 2003.

4.

Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York,
2005.

5.

Peter Wayner, “Disappearing Cryptography

Information Hiding: Steganography &
Watermarking”, Morgan Kaufmann Publis
hers, New York, 2002.

09NB15 WIRELESS SECU
RITY

3 0 0 3

WIRELESS TECHNOLOGIE
S:
Introduction to wireless technologies
-

Wireless data networks
-
Personal Area Networks
-
Transmission Media

WLAN standards
-

Securing WLANS
-

Countermeasures
-

WEP (Wired Equ
ivalence Protocol).
(8)

WIRELESS THREATS
:

-

Kinds of security breaches
-

Eavesdropping
-

Communication Jamming
-

RF interference
-

Covert wireless channels
-

DOS attack

Spoofing
-

Theft of services
-

Traffic
Analysis
-

Cryptographic threats
-

Wireless
security Standards.

(9)

SECURITY IN DATA NET
WORKS:
W
ireless Device security issues
-

CDPD security (Cellular
Digital Packet Data)
-
GPRS security (General Packet Radio Service)
-

GSM (Global System for
Mobile Communication)

security

IP security. (9)

23

WIRELESS TRANSPORT LAYER SECURITY:

Secure Socket Layer
-

Wireless Transport Layer
Security
-

WAP Security Architecture
-

WAP Gateway.

(8)

BLUETOOTH SECURITY:

Basic specifications

Pico
nets

Bluetooth security architecture

Scatternets

Security at the baseband layer and link layer

Frequency hopping

Security
manager

Authentication

Encryption

Threats to Bluetooth security.

(8)

Total 42

REFERENCES:

1.

Nichols and Lekka, “Wireless Security
-
Models, Threats and Solutions”, Tata McGraw

Hill,
New Delhi, 2006.

2.

Merritt Maxim and David Pollino, ”Wireless Security”, Osborne/McGraw Hill, New Delhi, 2005.

3.

William Stallings, “Cryptograp
hy and Network Security
-

Principles and practices, Prentice
Hall,
New Delhi
, 2006.

09NB16 INTRUSION DETECTION AND PREVENTION SYSTEM

3 0 0 3

INTRODUCTION:
Understanding Intrusion Detection

Intrusion detection and prevention basics

IDS and IPS an
alysis schemes, Attacks, Detection approaches

Misuse detection

anamoly
detection

specification based detection

hybrid detection

(9)

THEORETICAL FOUNDATI
ONS OF DETECTION:
Taxonomy of anomaly detection system

fuzzy logic

Bayes theory

Artificial Neural networks

Support vector machine

Evolutionary
computation

Association rules

Clustering

(9)

ARCHITECTURE AND IMPLEMENTATION:
Centralized

Distributed

Cooperative Intrusion
Detection
-

Tiered architecture

(8
)

JUSTIFYING INTRUSION

DETECTION
:
Intrusion detection in security

Threat Briefing

Quantifying risk

Return on Investment (ROI)

(4)

APPLICATIONS AND TOO
LS:

Tool Selection and Acquisition Process
-

Bro Intrusion Detection

Prelude Intrusion Dete
ction
-

Cisco Security IDS
-

Snorts Intrusion Detection

NFR security

(9)

LEGAL ISSUES AND ORG
ANIZATIONS STANDARDS
:
Law Enforcement / Criminal
Prosecutions

Standard of Due Care

Evidentiary Issues, Organizations and Standardizations
.

(3)

Tot
al 42

REFERENCES:

1.

Ali A. Ghorbani
,
Wei Lu
, “
Network Intrusion Detection and Prevention
: Concepts and
Techniq
ues”, Springer, 2010.

24

2.

Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw
Hill, 2004

3.

Paul E. Proctor, “The Practical Intrusion Detection Handbook “,Prentice Hall , 2001.

4.

Ankit Fadia and Mnu Zacharia, “Intrusiion Alert”,

Vikas Publishing house Pvt., Ltd, 2007.

5.

Earl Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education,
2006.

09NB17 SPEECH PROCES
SING

3 0 0 3

SPEECH SIGNAL MODELLING
:
Speech signal characteristics and classifi
cations
-

Speech
production mechanism
-

Acoustic Theory of speech production
-

Source

Filter model
-

Lossless
Tube Models
-

Digital Model of speech signals

(10)

SPEECH SIGNAL ANALYSIS
:

Time domain Analysis for speech proces
sing

Short time energy
and magnitude
-

short time average zero crossing
-

Speech vs silence discrimination
-

Pitch
period estimation using autocorrelation
-

Short time Fourier analysis
-

Definition and properties
-

Design of digital filter banks
-

Pitch d
etection
-

analysis by synthesis

(12)

SPEECH CODING
:

Linear pred
ictive coding
-

principle
-

solution of LPC equation
-

Cholesky
decomposition method
-

Durbin's method
-

Lattice formulation

Frequency domain coding

Model based coding

LPC residual coding

(10)

SPEECH RECOGNITION
:
Template training method
-

Hidden Markov Model
-

Gaussian Mixture
model
-

connected word recognition
-

Speaker identification/Verification.

(10)

Total 42

REFERE
NCES
:

1.

Rabiner L R and Schaffer R W, "Digital Processing of Speech Signals", Prentice
-
Hall,
Englewod
-

Clitts, New Jersey, 1986.

2.

Rebner L R K and Juang B H, "Fundamentals of Speech Recognition", Pearson Education,
First Indian reprint 2003.

3.

Kondoz, "Dig
ital Speech", John Wiley and Sons Ltd., 1994.

4.

Thomas F Quatieri, “Discrete Time Speech Signal Processing”, Pearson Education, 2002.

5.

John R Deller, John Hansen and Proakis J G, ” Discrete Time Processing of Speech
Signals”, IEEE Press, 1999.

25

09NB18

PATTERN RECOGNITION

3 0 0 3

INTRODUCTION
:
Basic Concepts of Pattern Recognition
-

Fundamental problems in Pattern
Recognition System Design
-

Design Concepts and Methodologies

Examples of Automatic
Pattern Recognition Systems

(
6)

PATTERN
CLASSIFICATION BY DISTANCE FUNCTIONS
: Minimum Distance Pattern
Classification

Cluster Seeking

Unsupervised Pattern Recognition

(7)

PATTERN CLASSIFICATION BY LIKELIHOOD FUNCTIONS:

Introduction

Pattern
Classification as a Statistica
l Decision Problem

Bayes Classifier for Normal Patterns
-

Nonparametric decision making

(10)

PATTERN PREPROCESSIN
G AND FEATURE SELECT
ION:

Similarity and Distance

Clustering Transformations and Feature Ordering

Clustering in F
eature Selection

Feature
selection through Divergence Maximization

Binary Feature Selection

(10)

CASE STUDIES IN PATT
ERN RECOGNITION:

Clustering

Artificial Neural Networks

Image
Analysis

(
9)

Total 42

REFERENCES:

1.

Earl Gose, Richard Johnsonbaugh and Steve Jost,”Pattern Recognition and Image Anal
ysis”,
Prentice Hall, New Delhi, 2005.

2.

Earl Gose Richard Johnsonbaugh Steve Jost, “Pattern Recognition And Image Analysis”,
Prentice Hall, Inc, 2002

3.

Wolff D D Parsons M L, “Pattern Recognition Approach To Data Interpretation”, Plenum
Press, 1983
.

4.

Julius T
. Tou and Rafael C. Gonzalez, "Pattern Recognition Principles”, Addison Wesley,
New Delhi, 1974

09NB19 INFORMATION T
HEORY AND
CODING

3 0 0 3

RANDOM VARIABLES AND PROCESSES
:

Events
-

Random variables
-

Distribution and
density functions
-

Operations o
n random variables
-

Covariance
-

Correlation functions
-

Random process
-

Stationarity
-

Spectral decomposition
-

Response of linear system to
random inputs,
Relation between information and probability

(10)

INFORMATION ENTROPY
FUNDAME
NTALS:

Self information measure
-

mutual and self
information
-

Entropy function

-

Characteristics of Entropy function
-

Conditional Entropies
-

Derivation of the noise characteristics of a channel
-

Redundancy
-

Efficiency and channel
capacity
-

capacitie
s of channels with symmetric noise structure.
Huffman coding:
Implementation of Huffman code, Shannon's theorem, Code design, Shannon
-

Fano coding.
(10)

ERROR CONTROL CODING

:
Backward error correction linear block codes, BCH cod
es, Golay
codes, efficiency of LBC, forward correction codes
-
Convolution coding decoding algorithms,
Viterbi decoding optimum decoding performance measures

(8)

26

DATA AND VOICE CODING:

Context dependent coding, arithmetic codes, overall efficiency
consideration. Voice coding, Delta Modulation and adaptive delta modulation, linear predictive
coding, silence coding, sub
-
band coding (8)

COMPRESSION TECHNIQUE
S:
Principles

Text compression

Static Huffman Coding
-

Dynamic Huffman coding. Arithmetic coding

Image Compression

Graphics Interchange
format

Tagged Image File Format

Digitized documents

Introduction to JPEG standards.

(6)

Total 42

REFERENCES:

1.

Reza F M, "An Introduction to Information Theory", McGraw Hill, 2000.

2.

Viterbi A and Omura J K, "Principles of Digital Communication and

Coding", McGraw Hill,
1979.

3.

Cover T M and Thomas J A, “Elements of Information theory”, 2nd edition, John Wiley &
Sons, 2006.

4.

Sheldon M Ross, “Introduction to Probability Models”, Academic Press, 2003

5.

Roth R, “Introduction to Coding theory”, Cambridge
University Press, 2006.

6.

Peter Sweeney, “Error Control Coding: From Theory to Practice”, John Wiley & Sons, 2002.

09NB20

ARTIFICIAL INTELLIGENCE

3 0 0 3

INTRODUCTION
:
Artificial Intelligence

History

The state of art
-

Intelligent Agents

Structu
re

Environment. (3)

SEARCH STRATEGIES:

Breadth
-
first search
-

Uniform cost search
-

Depth
-
first search
-

Depth
-
limited search
-

Iterative deepening search
-

Bidirectional search
-

Heuristic search techniques
-

Comparing search strategies.

(6)

KNOWLEDGE AND REASON
ING
:
Representation

Logic

Propositional logic

Using
predicate logic, using rules
-

Forward and backward chaining

Strong and weak slot fillers.

(8)

PLANNING
:

Overview
-

An example domain
-

Components
-

Goal S
tack planning
-

Non
-
linear
planning
-

Hierarchical planning
-
Reactive systems.

(7)

UNCERTAINTY
:
Non
-
monotonic reasoning
-

Logics
-

Implementation
-

Probability and Bayes
theorem
-

Certainty factors
-

Bayesian networks
-

Dempster
-

Shafer t
heory.

(6)

NATURAL LANGUAGE PRO
CESSING:
Phases
-

Syntactic Processing
-
Semantic Analysis
-
Discourse and Pragmatic Processing.

(4)

LEARNING:

Introduction
-

Learning by Taking Advice
-

Learning

in problem solving
-

Inductive
learning
-

Learning decision trees
-
Explanation
-
based learning
-
Formal learning
-
Learning in Neural
and Belief Networks.

(4)

27

EXPERT SYSTEMS:
Features

Characteristics
-
Architecture
-
Basic Activities
-
Stages in
developm
ent
-

Structure of a knowledge base

Probability based Expert Systems
-

Tools.

(4)

Total 42

REFERENCES:

1.

Stuart Russell and
Peter Norvig, “Artificial Intelligence

A Modern Approach”, Prentice Hall
of India, Second Edition, New Delhi, 2008.

2.

Elaine Rich and Kevin Knight, “Artificial Intelligence”, Tata McGraw Hill Publishing Company,
New Delhi, 2005.

3.

Dan W

Patterson, “Introdu
ction to AI and Expert Systems”, Prentice Hall of India, New Delhi,
2006.

4.

Eugene Charniak, Drew McDermott, “Introduction to Artificial Intelligence”, Pearson
Education, New Delhi, 2006.

5.

Nils J Nilsson, “Principles of Artificial Intelligence”, Narosa Publi
shing House, New

Delhi,
2005.

6.

N P Padhy, “Artificial Intelligence and Intelligence Systems”, Oxford University Press, 2006

09NB21 DISTRIBUTED COMPONENT AND ENTERPRISE SYSTEM

3 0 0 3

INTRODUCTION:

Review of Object Oriented Technology

RP
C Concepts, ActiveX and OLE
concepts, Component concepts , Benefits , Requirements

Basic Distributed Objects

Methods
of Distribution, Introduction to Grid computing

the next generation distributed computing

(5)

CORBA:

COR
BA Overview

Object Management Group

Object Management Architecture

CORBA Architecture

ORB Structure

OMG IDL

ORB and Object Interfaces

Object
Adapter, Basic Object Adapter

Portable Object Adapter

Language Mappings

Dynamic
Invocation and
Dynamic Skeleton Interface

BOA Vs POA

GIOP

IIOP

CORBA Services

(12)

COM/DCOM:

Fundamental Programming Architecture: From OLE to DCOM

COM
Background

COM Interfaces

Types of Components

COM library.

IUnknown and
IClassFactory

Type

Libraries

Threading models and Apartments

Monikers

DLL
Surrogates and Executable Components, Marshalling

Introduction to Distributed COM, COM+
and .NET

(10)

ENTERPRISE FOUNDATIONS:

Enterprise Architectural overview, Object oriented softw
are’s
importance for Enterprise

Enterprise Concepts

Component Models

Component Based
Development and Standards

Java Enterprise System Architecture with J2EE

(4)

SERVICES FOR DISTRIBUTED ENTERPRISE SYSTEMS:

Na
ming Services, Overview,
CORBA Naming

DCOM Naming.

Directory and trading services: CORBA Trading Service.

Activation Services: CORBA Activation Framework

DCOM Activation Framework.

Messaging
Services: Messaging Overview

CORBA Messaging. Introducti
on to Transaction Services and
Security services

(6)

28

SERVICE ORIENTED ARCHITECTURE:

Introduction to web services

SOA, Business value
of SOA

Architecture elements

(5)

Total 42

REFERENCES:

1.

Paul J Perrone , Venkata S.R. Krishna, Chayanti.R, " Building Java Enterprise Systems with
J2EE" ,Techmedia, New

Delhi, 2000.

2.

Andreas Vogel, Vasudevan.B, Benjamin.M and Ted Villalba, “C++ Programming with

CORBA”, John Wiley & Sons,

New York, 1999.

3.

Guy Eddon and Henry Eddon, "Inside Distributed COM", Microsoft Press, New Delhi, 1998.

4.

Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones, Rawn Shah, "Service
Oriented Architecture (SOA) Compass" IBM p
ress, 2005.

5.

Dirk Slama, Jason Garbis and Perry Russel,” Enterprise CORBA”, Prentice Hall, New Jersey,
1999.

6.

Dale Rogerson, "Inside COM", Microsoft Press, New Delhi, 1997.

09NB22

ETHICAL HACKING

AND NETWORK DEFENSE

3 0 0 3

ETHICAL HACKING OVERVIEW:

Intro
duction
-

Certified Ethical Hackers

Network and
Computer Attacks

Ethical Hacking Plan

Hacking Methodology.

(5)

FOOTPRINTING AND SOCIAL ENGINEERING:

Footprinting Tools

Conducting Competitive
Intelligence
-

DNS Zone Transfers

Introduction to Social Engineering

Performing Social
Engineering Attacks
-

Social Engineering Countermeasures.

(6)

SERVICE SCANNING:

Introduction to Port Scanning

Types of Port Scan

Port Scanning
Tools
-

Conducting Ping Sweeps
-

Shell Scripting. Enumeration: Introduction
-

Enumerating
Windows, Symbian, Java OS, Android and NetWare Operating Systems.

(8)

HACKING NETWORKS:

Hacking Web Servers: Web Application

Web Application
Vulnerabilities

Tools for Web Attackers and Security Testers. Hacking Wireless Network:
Wireless Technology

Wireless Network Standards

Authentication

Wardriving

Wi
reless
Hacking

Protecting Networks with Security Devices.

(8)

HACKING OPERATING SYSTEMS:

Windows: Vulnerabilities

Choosing Tools

Information
Gath
ering

RPC

Null Sessions

Share Permissions

Hardcore Vulnerability Exploitation.
Linux: Vulnerabilities

Information Gathering

Unconnected Services
-

.rhosts and hosts.equiv
Files

NFS

File Permissions

Buffer Overflow.

(8)

HACKING APPLICATIONS:

Messaging Systems

Web Applications

Mobile Applications
-

Databases
-

Reporting Results.

(7)

Total 42

REFERENCES:

1.

Michael T. Simpson, “Ethical Hacking and Network Defense”, Cengage Learning, New
Delhi,

2010.

29

2.

Kevin Beaver, “Hacking for Dummies”, Wiley Publication, India, 2007.

3.

Ankit Fadia, “Unofficial Guide to Ethical Hacking”, Macmillan Company, New Delhi, 2001.

09NB51 BIOMETRIC SIGNAL PROCESSING LABORATORY

0 0 3 2

List of Experiments

1.

Image Enhance
ment

2.

Image Segmentation

3.

Image Acquisition
-

Fingerprint

4.

Feature Extraction
-

Fingerprint

5.

Image Acquisition
-

Face

6.

Feature Extraction
-

Face

7.

Image Acquisition
-

Iris

8.

Feature Extraction
-

Iris

9.

Multimodal Biometrics
-

Serial

10.

Multim
odal Biometrics
-

Parallel

09NB52 CYBER SECURITY LAB
ORATORY

0 0 3 2

1.

Implementation of Substitution and Transposition ciphers

2.

Implementation of Data Encryption Standard

3.

Implementation of International Data Encryption Algorithm

4.

Implementation of Advanced

Encryption Standard

5.

Implementation of RSA Algorithm

6.

Implementation of Diffie
-
Hellman Key Exchange

7.

Implementation of Message Authentication Codes

8.

Implementation of Hash functions

9.

Implementation of Digital Signature Standard

10.

Hiding of confidential informat
ion within Image

30

09NB53 DATABASE SECURITY LAB
ORATORY

0 0 3 2

1.

Creating a database for an application using DDL.

2.

Setting up of integrity constraints.

3.

Data manipulation using DML queries.

4.

Use Rollback, commit, savepoint, grant and revoke commands.

5.

Creati
on, deletion and modification of users and implementing authentication mechanisms
for different users.

6.

Designing and implementing password policies.

7.

Creating, assigning and revoking user roles.

8.

Implementing a Virtual private database.

9.

Auditing database act
ivities with Oracle.

10.

Security auditing with SQL Server.

0
9NB55 OBJECT COMPUTI
NG AND DATA STRUCTUR
ES LABORATORY

2 0 3 4

PRINCIPLES OF OOP:

Programming paradigms, basic concepts and benefits of OOP,
applications of OOP.

(2)

INTRODUCTION TO C++:

History of C++, structure of C++, basic data types, derived data
types
, symbolic constants, dynamic initialization, type modifiers, type casting, operator and
control statements, input and output statements.

(3)

CLASSES AND OBJECTS:
Class specification, member function specification , scope resolution
operator, access

qualifiers, instance creation, member functions, function prototyping, function
components, passing parameters, call by reference, return by reference, inline function, default
arguments, overloaded function. Array of objects, pointers to objects, this
pointer, dynamic
allocation operators, dynamic objects. Constructors, parameterized constructors, overloaded
constructors, constructors with default arguments, copy constructors, static members and static
objects as arguments, returning objects, friend fun
ction and friend class.

(7)

OPERATOR OVERLOADING:
Operator function, overloading unary and binary operator,
overloa
ding the operator using friend function.

(2)

INHERITANCE:

Defining derived class, single inheritance, protected dat
a with private
inheritance, multiple inheritance, multi level inheritance, hierarchical inheritance, hybrid
inheritance, multi
-
path inheritance, constructors in derived and base classes, abstract classes.

(5)

INTRODUCTION TO DATA STRUCTURES:

Abstract data types, primitive data structures,
analysis of algorithms, notation.

(5)

31

ARRAYS:

Operations, implementation of one, two and multi dimensioned arrays, different types
of array applications.

(5)

STRINGS:

Implementation, Operations, applications.

(3)

STACKS:
Primitive operations, sequential implementation, applications. Recursion definition,
process and implementation using stacks, evaluation of expressions.

(3)

QUEUES: Primitive

operations, sequential implementation, applications. Priority queues,
dequeues.

(3)

SORTING:
Insertion sort, selection sort, bubble sort, heap sort, radix sort algorithms and
analysis.

(4)

Total 42

REFERENCES
:

1.

Bjarne Stroustrup, “The C++ Programming Language”, Addison Wesley, 2004.

2.

Stanley B Lippman and Josee Lajoie, “The C++ Primer”, Addison Wesley, 2005.

3.

Harvey M Deitel
,and
Paul J. Deitel
, “
C++ How to Program”,
Prentice Hall,

2007.

4.

Aaron M T
anenbaum, Moshe J Augenstein and Yedidyah Langsam, “Data

structures using
C and C++”, Prentice

Hall of

India, 2005.

5.

Sahni Sartaj, “Data Structures, Algorithms and Applications in C++”,

Universities Press,
2005.

6.

Nell Dale, “C++ Pl
us Data Structures”, Jones and Bartlett, 2006.

7.

Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Addison
-

Wesley,
2006.

8.

Robert L Kruse and Clovis L Tondo, “ Data Structur
es and Program design in
C”, Pearson
Education, 20
05.