- Written by akila
- Hits: 2740
INTELECTIUM ’10 – EVENTS REPORT OF INFORMATION TECHNOLOGY
INTELECTIUM ’10 – EVENTS REPORT OF
INFORMATION TECHNOLOGY
The function started with the Welcome Address given by Ms. S.Akila Devi, Head of the Department of Information Technology. The Chief-Guest for the function was Mr. M. Dhanasekar, Chief Executive Officer, Adodis Technologies (P) Ltd.
EVENT I-PAPER PRESENTATION
WINNERS
I PRIZE:
AUTHOR: Vignesh Pandurangan
TITLE- Traceback at router with improvised authentication
ABSTRACT:-Distributed denial of service attacks (DDoS) currently represent a serious threat to appropriate operation of Internet services. To deal with this threat an IP- traceback scheme is available that forms an overlay network at the level of autonomous systems. This model doesn’t require a priori knowledge of the network topology and allows single-packet traceback and incremental deployment. This model currently traces back to the autonomous system but not to individual system which is left as future work. The problem with this model is that an attacker who has made a zombie attack and has taken control of innocent hosts or an attacker with a spoofed IP address leaves no trace of him. In order to identify the original source of the attack, first we create a router level traceback that helps in identifying the source of the attack more accurately, second we suggest an authentication system that uses elliptical curve digital signatures for authenticating the packets getting out of the system that has this model deployed. As an extension and as a solution to the above said problem we propose our system with router level traceback and improvised authentication.
II PRIZE:
AUTHOR : R.Ramalakshmi,
Sethu Institute Of Technology
TITLE : Network Security Using ASP.NET
ABSTRACT: In this current world where everything is moving online like booking tickets, online banking. It becomes mandatory for us to make this transaction more secure without chances of intruders hacking the information. Day by Day the application moving online is increasing and at the similar rate the issues relating to intruding of credentials has also increased. So it has become so vital that the transactions should take place in a protected ambience without any possibility of Stealing the information. Imagine the disaster that would result if some credential information about the users gets hacked in an online banking.
PARTICIPATORY PRIZE:
1.AUTHOR : P.KalaiSelvam
TITLE : IDPF TECHNIQUE TO PREVENT IP SPOOFING
ABSTRACT: The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an interdomain packet filter (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information.
IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. Based on extensive simulation studies, we show that, even with partial employment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.
2. AUTHOR: AbinayaLakshmi.E and Aishwarya Laksmi.M,
TITLE : AGROBATS
ABSTACT— This paper contains a description of the echanical design route that was adopted in building a small Agriculture Robot. At the outset, we decided to follow a set of guidelines that defined a broad set of specifications that featured safety, low weight, small length, large mission time, easy-to-use, application specific, and most importantly low cost. The paper will address the most important design issues, lessons learned, and problems that remain for further development.
EVENT II-PROJECT DISPLAY
BEST PRIZE : E.Abinaya Laksmi , M.Aishwarya Lakshmi , P.Mohana Priya
TITLE : Graph Simulator
ABSTRACT
Graph simulator is designed using C language and interfacing is done using graphics in C.
This software can simulate the curve aX^2+bY^2+cX+dY=e and more generalized forms of curves such as parabola, hyperbola etc.Depending on the values of a,b,c,d,e it can draw ellipse, circle, parabola, hyperbola, straight line etc.The user can change the scale of X-axis or Y-axis during run time.The user can also amplify the curve and can get the more detailed shape of the curveThe user can also be able to shift the entire graph either left, right, top, or bottom in the screen so that the user is able to see where the curve goes and where it exactly cuts the X or Y axis.The user can able to see the values of points traced out by the curve. This feature enables the user to know the exact points of X and Y axis traced out by the curve and the points where it cuts the X or Y axis.Options are also included to draw more generalized forms of curves like (Y+a) ^2=c(X+b) etc.Effective user interface is included and the user can retrieve all the information about the curve in the screen.Just by giving the values of a,b,c,d,e the user can know what type of curve it is and all the necessary information about the curve without knowing anything about the curve.The graph simulator is designed without using any inbuilt functions in graphics library such as ellipse(),circle() etc.
EVENT III- TECHNICAL QUIZ
WINNERS
I PRIZE: L.Vadivel Murugan & A.Lithiya
II PRIZE: R.Sathish Kumar & R.Harish
EVENT IV- DEDUGGING
WINNERS
I PRIZE: Kiruthiya.B & M.Sumathy
II PRIZE: G.Essaki Rani
&
R.Ramalakshmi
Sethu Institute Of Technology
EVENT V- WEB DESIGNING
WINNERS
I PRIZE: S.Rohini & K.Indumathy
II PRIZE: N.Uma & S.S.Abilasha