We are building EduLadder(ELADR) - Protocol

The Eladr Protocol is a decentralized, security and efficiency enhanced Web3 noSQL database powered by IPFS as the data storage layer https://ipfs.io/, and the Cardano block chain as the rewards token platform, https://cardano.org/. It provides a JSON based, IPFS layer 2 solution for data indexing and retrieval in an 'append only' file system built with open source Node.js API libraries.

The ELADR token was designed to incentivize and reward community members as a proof of contribution. Token holders are also granted access to EduLadder.com premium features as well as associated ELADR token enabled apps.

WHITE PAPER Buy Now Try BETA

Real Problems! Real Experts!

Join Our Telegram Channel !


The Eduladder is a community of students, teachers, and programmers. We help you to solve your academic and programming questions fast.
In eduladder you can Ask,Answer,Listen,Earn and Download Questions and Question papers.
Watch related videos of your favorite subject.
Connect with students from different parts of the world.
Apply or Post Jobs, Courses ,Internships and Volunteering opportunity. For FREE
See Our team
Wondering how we keep quality?
Got unsolved questions? Ask Questions


You are here:Open notes-->Seminar-topics-and-ppt-for-engineering-->SELF-DEFENDING-NETWORKS

SELF DEFENDING NETWORKS

How to study this subject


The Self Defending Networks have enough intelligence to identify threats and to treat the security breaches by recoganising the limit or extend of damage done. This is by encorporating the required intelligence into its routers and switches and by making use of specific zones, which treats the affected user accordingly.

The Self Defending networks make use of a quarantine zone. Any user who is restricted acssess to the network enters the quarantine zone and depending on the quarantine zone handles the culprit according to the type and nature of his access breach. There are two ways in which the quarentine zone treats the culprits:

i. Either it can treat the access breach by denying total network access to the user.
ii. Or it may offer limited services and not cutting him out totally. Those users who are restricted access to the network are given the option of downloading the latest version of the anti-virus software/s currently available.


For example, suppose an unsuspecting person uses an infected laptop to try and login to his company’s website. Here the SDN not only informs the user that his system is infected , but also gives him the option of downloading the latest version of the required software inorder to protect his system from such similar attacks in future.

Thus, the SDN prevents the entry of viruses and worms by keeping a clear end point.i.e prevents external attacks.Now in case of an internal attack,.i.e if ever a system or network does manage to get into an SDN, the SDN prevents spread of the virus to other systems by identifying the infected systems and preventing all communication between these and the uninfected ones.

Official Notes


Add contents here

Notes from other sources


Self Defending Networks.doc


Model question papers


Add contents here

Previous year question papers


Add contents here

Useful links


Add contents here

Editors

RajivRajiv


You might like this video:Watch more here

Watch more videos from this user Here

Learn how to upload a video over here