We are building EduLadder(ELADR) - Protocol

The Eladr Protocol is a decentralized, security and efficiency enhanced Web3 noSQL database powered by IPFS as the data storage layer https://ipfs.io/, and the Cardano block chain as the rewards token platform, https://cardano.org/. It provides a JSON based, IPFS layer 2 solution for data indexing and retrieval in an 'append only' file system built with open source Node.js API libraries.

The ELADR token was designed to incentivize and reward community members as a proof of contribution. Token holders are also granted access to EduLadder.com premium features as well as associated ELADR token enabled apps.


Real Problems! Real Experts!

Join Our Telegram Channel !

The Eduladder is a community of students, teachers, and programmers. We help you to solve your academic and programming questions fast.
In eduladder you can Ask,Answer,Listen,Earn and Download Questions and Question papers.
Watch related videos of your favorite subject.
Connect with students from different parts of the world.
Apply or Post Jobs, Courses ,Internships and Volunteering opportunity. For FREE
See Our team
Wondering how we keep quality?
Got unsolved questions? Ask Questions

You are here:Open notes-->Seminar-topics-and-ppt-for-engineering-->SELF-DEFENDING-NETWORKS


How to study this subject

The Self Defending Networks have enough intelligence to identify threats and to treat the security breaches by recoganising the limit or extend of damage done. This is by encorporating the required intelligence into its routers and switches and by making use of specific zones, which treats the affected user accordingly.

The Self Defending networks make use of a quarantine zone. Any user who is restricted acssess to the network enters the quarantine zone and depending on the quarantine zone handles the culprit according to the type and nature of his access breach. There are two ways in which the quarentine zone treats the culprits:

i. Either it can treat the access breach by denying total network access to the user.
ii. Or it may offer limited services and not cutting him out totally. Those users who are restricted access to the network are given the option of downloading the latest version of the anti-virus software/s currently available.

For example, suppose an unsuspecting person uses an infected laptop to try and login to his company’s website. Here the SDN not only informs the user that his system is infected , but also gives him the option of downloading the latest version of the required software inorder to protect his system from such similar attacks in future.

Thus, the SDN prevents the entry of viruses and worms by keeping a clear end point.i.e prevents external attacks.Now in case of an internal attack,.i.e if ever a system or network does manage to get into an SDN, the SDN prevents spread of the virus to other systems by identifying the infected systems and preventing all communication between these and the uninfected ones.

Official Notes

Add contents here

Notes from other sources

Self Defending Networks.doc

Model question papers

Add contents here

Previous year question papers

Add contents here

Useful links

Add contents here



You might like this video:Watch more here

Watch more videos from this user Here

Learn how to upload a video over here