Sei sulla pagina 1di 10

Chhattisgarh Swami Vivekanand Technical University, Bhilai (C.G.

)
Scheme of Teaching and Examination
M.Tech. Computer Science & Engineering
Specialization in Cyber Forensic & Information Security
Semester – I
Scheme Of
Periods per Credi
Examination Total
Board of Subject week t
S.No Subject Mar
studies Code L+(T
Theory/Practical ks
+P)/2
L T P ESE CT TA
Mathematical
Foundation
Applied
1. 587111(14) of 3 1 - 100 20 20 140 4
Mathematics
Information
Security
Data
Computer Sc. &
2. 587112(22) Communicati 3 1 - 100 20 20 140 4
Engg.
on
Cryptograph
Computer Sc. &
3. 587113(22) y & Network 3 1 - 100 20 20 140 4
Engg.
Security
Computer Sc. & Cyber
4. 587114(22) 3 1 - 100 20 20 140 4
Engg forensics
5. Refer Table – I Elective – I 3 1 - 100 20 20 140 4
Computer Sc. & Information
6. 587121(22) - - 3 75 - 75 150 2
Engg Security Lab
Digital
Signal &
Computer Sc. &
7. 587122(22) Image - - 3 75 - 75 150 2
Engg
Processing
Lab
Total 15 5 6 650 100 250 1000 24

L – Lecture, T – Tutorial, P – Practical, ESE – End Semester Examination, CT – Class Test, TA –


Teacher Assessment.

Table - I
Elective – I

S. No. Board of Study Subject


1. Computer Science & Engg. 587131(22) Information Theory & Coding
2. Computer Science & Engg. 587132(22) Wireless Communication
3. Computer Science & Engg. 587133(22) Data Mining & Warehousing
st
Semester:. – 1 Branch: Cyber Forensics & Information Security
Subject: Mathematical Foundations of Information Security Code: 587111(14)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class
tests to be conducted: 02

Unit – I INTRODUCTION TO SET THEORY


Basic concept of set theory, Rough Set theory, Relations, Properties of relation in a set, Equivalence
relation, Composition of relations, Partial order & total order relations, Lattices & Hasse diagram,
Introduction to function, Inverse, Identity, Injective, Surjective & Bijective functions, Composition of
functions and some special functions.

Unit – II INTRODUCTION TO GRAPH THEORY


Introduction to graph theory, Walks, Paths & Circuits, Types of graphs, Shortest path problems,
Eulerian and Hamiltonian graphs, Basic concept of tree: Spanning tree, Minimum Spanning tree,
Search tree, Rooted Binary tree, Cut sets, Network flow, Matrix representation of graphs.

Unit – III GROUP THEORY & CODING


Basic concept of Group theory, Homomorphism and Isomorphism of groups, COSETS and
Lagrange’s Theorem, Elements of Coding theory, Group codes, Decoding, Hamming matrices, The
Parity check and Generator Matrices.

Unit – IV INTRODUCTION TO NUMBER THEORY


Facts from elementary number theory, Fundamental theorem of arithmetic, G.C.D., Modular
Operator,
Euclid’s algorithm, Modular arithmetic, Fermat’s little theorem, Euler’s Theorem, Modular
Multiplicative Inverse, Primality Testing.

Unit – V INTRODUCTION TO CRYPTOGRAPHY


Introduction to Cryptography, Encryption, Decryption, Integer Factoring Problem, Discrete
Logarithm Problem, Hash Function, Digital Signature, Symmetric key Cryptosystem, Public key
Cryptosystem, Diffie-Hellman Key Exchange, RSA Cryptosystem, ElGamal Cryptosystem, Elliptic
Curve Cryptosystem.

Text Books :
1. J.P. Tremblay and R. Manohar, “Discrete Mathematical Structures with applications to Computer
Science”, TataMcGraw-Hill, 2000.
2. Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, “Handbook of Applied
Cryptography”, CRC Press, 2000.
Reference Books :
1. C.L. Liu, “Elements of Discrete Mathematics”, Tata McGraw-Hill, 2002.
2. Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography: Principles and
Protocols”, Ramat Gan, CRC Press Series, 2002.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Data Communication Code : 587112(22)
Total Tutorial Periods: 12 Total Theory Periods: 40
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02

UNIT-I
Introduction
Introduction - OSI reference model-TCP/IP reference model-Electrical interface-Transmission media-
Attenuation-data transmission basics-asynchronous transmission– synchronous transmission - error
detection methods.

UNIT-II
Protocol
Introduction – Error control-Idle RQ - continuous RQ - Character oriented protocols –simplex - half
duplex - duplex protocol - Bit oriented protocol – HDLC

UNIT-III
Local area networks:
Introduction – Wired LANs – Ethernet, Token bus Token Ring, FDDI-Wireless LANs- Bridges-
Transparent bridges, source routing bridges

UNIT-IV
Internetworking
Internet Protocols-Principles of Internetworking-connectionless internetworking-Ipv4-IPv6 - Internetwork
operation - Routing protocols

UNIT-V
Transport & Application Layer
Transport protocols-connection oriented service-TCP-TCP congestion control-UDPNetwork security-
public key encryption and digital signatures-Introduction to Application layer.

Text Books :
1. William Stalling,”Data & Computer Communications”, 6th edition, Pearson Education, 2003.
2. Douglas E. Comer and Ralph E. Droms,” Computer Networks and Internet”, 3rd edition, Pearson
Education, 2001.

Reference:
1. Fred Halsal,”Data Communication, Computer Networks and Open Systems”,Pearson Education, 2001
2. Andrew S. Tanenbaum,”Computer Networks”, 4th edition, PHI, 2000.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Cryptography and Network Security Code : 587113(22)
Total Tutorial Periods: 12 Total Theory Periods: 40
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be
conducted: 02

Unit I
Overview: OSI security architecture - Security Attacks- Security Services Security Mechanisms.

Unit II
Symmetric Ciphers: Classical Encryption Techniques - Block ciphers and Data Encryption Standards.
Public-key Encryption and Hash Functions: Public-Key Cryptography and RSA.

Unit III
Network Security Practices: Authentication applications: Kerberos – X.509 Authentication Service –
public-key Infrastructure - Electronic Mail Security: Pretty Good Privacy – S/MIME

Unit IV
Network Security Practices: IP Security: Overview – IP Security Architecture –Authentication Header –
Encapsulating Security Payload – Combining Security Associations – Key Management – Web security:
Web security considerations SSL and Transport Layer Security.

Unit V
System Security: Intruders: Intrusion Detection – Password Management –Malicious Software: Virus and
related threats – Denial of Service attacks – Firewalls : Firewall design principles – Trusted systems –
Common Criteria for IT security evaluation.

Text Book:
1. “Cryptography and Network Security – Principles and Practices”, William Stallings Prentice-Hall,
Fourth edition, Nov 2005
2. “Cryptography and Network Security, Atul Kahate”, McGraw Hill Education (India) Private Limited;
Third edition

Reference:
1. “Introduction to cryptography”, Johannes A, Buchanan, Springer-Verlag, Second Edition, 2004.
2. “Applied Cryptography: Protocols & Algorithms”, Schneier & Bruce, MGH International.
3. “Cryptography and Security – by Dr T R Padmanabhan N Harini “, Wiley India Pvt Ltd, 2011.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Cyber Forensics Code : 587114(22)
Total Tutorial Periods: 12 Total Theory Periods: 40
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted: 02

Unit I
Cyber forensics
Introduction to Cyber forensics, Information Security Investigations , Corporate Cyber Forensics,
Scientific method in forensic analysis, Investigating large scale Data breach cases., Analyzing Malicious
software.

Unit II
Ethical Hacking
Essential Terminology, Windows Hacking , Malware, Scanning, Cracking.

Unit III
Digital Evidence in Criminal Investigations
The Analog and Digital World, Training and Education in digital evidence, The digital crime scene,
Investigating Cybercrime, Duties Support Functions and Competencies.

Unit IV
Investigating Network Intrusions and Cyber Crime, Network Forensics and Investigating logs,
Investigating network Traffic, Investigationg Web attacks, Router Forensics.

Unit V
Cyber forensics tools and case studies.

Text Book:
1. CyberForensics: Understanding Information Security Investigations (Springer's Forensic
Laboratory Science Series) by Jennifer Bayuk
2. Handbook of Digital and Multimedia Forensic Evidence [Paperback] John J. Barbara

References:
1. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers
& IT Security Experts Ali Jahangiri
2. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series:
Computer Forensics)
st
Semester:– 1 Branch: Cyber Forensics & Information Security
Subject: Information Theory and Coding (ELECTIVE – I) Code : 587131(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be
conducted: 02

Unit- I SOURCE CODING


Introduction to information theory, Uncertainty and information, Average Mutual information and
entropy, Source Coding Theorem, Shannon-Fano Coding, Huffman Coding, Arithmetic Coding, Lempel-
Ziv Algorithm, Run-length Encoding and Rate Distortion Function.

Unit-II CHANNEL CAPACITY AND CODING


Channel models, Channel capacity, Channel coding, Information capacity theorem, Random selection of
codes, Error control coding, Linear block codes and their properties, Decoding of linear block code,
Perfect codes, Hamming codes, Optimal linear codes and MDS codes.

Unit-III CYCLIC CODES


Polynomials, Division algorithm for polynomials, A method for generating cyclic codes, Matrix
description of cyclic codes, Burst Error Correction, Fire codes, Golay codes, CRC codes, Circuit
implementation of cyclic codes. BCH codes, Minimal polynomials, Generator polynomial for BCH
codes, Decoding of BCH codes, Reed-Solomon codes and nested codes.

Unit-IV CONVOLUTION CODES


Tree codes and trellis codes, Polynomial description of convolutional codes, Distance notions for
convolutional codes, Generation function, Matrix description of convolutional codes, Viterbi decoding of
convolutional codes, Distance bounds for convolutional codes, Turbo codes and Turbo decoding.

Unit-V TRELLIS CODED MODULATION


Concept of coded modulation, Mapping by set partitioning, Gottfried Ungerboeck’s TCM design rules,
TCM decoder, Performance evaluation for Additive White Gaussian Noise (AWGN) channel, TCM for
fading channels.

Text Book:
1. Ranjan Bose, “Information theory: Coding and Cryptography”, Tata McGraw Hill, 2002.
2. Communication Systems by R. P. Singh and S. D. Sapre, 2 nd Edition TMH
Reference Books :

1. Viterbi, “Information Theory and Coding”, McGraw Hill, 1982.


nd
2. John G. Proakis, “Digital Communications”, 2 Edition, McGraw Hill, 1989.
nd
3. Katre, J. S., “Information Theory and Coding Techniques”, 2 Revised Edition, Tech-Max, Pune.
st
Semester: M.Tech. – 1 Branch: Cyber Forensics & Information Security
Subject: Wireless Communication (ELECTIVE – I) Code : 587132(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be
conducted: 02

Unit - I OVERVIEW OF CELLULAR SYSTEMS


A basic cellular system, Performance criteria, Uniqueness of mobile radio environment, Operation of
cellular systems, Planning a cellular system, Overview of generations of cellular systems, Elements of
Cellular Radio, Systems Design and Interference, General description of the problem, Concept of
frequency reuse channels, Co-channel Interference reduction factor, Desired C/I from a normal case in an
Omni-directional antenna system, Cell splitting, Consideration of the components of cellular systems,
Introduction to co-channel interference, Co-channel measurement design of antenna system, Antenna
parameter and their effects.
Unit - II MOBILE SIGNAL COVERAGES AND PROPOGATION LOSS MEDIUMS
Cell Coverage for Signal & antenna structures, General introduction, Obtaining the mobile point to point
mode, Propagation over water or flat open area, Foliage loss, Propagation in near distance, Long distance
propagation, Point-to-Point prediction model- Characteristics, Cell site, Antenna heights and Signal
coverage cells, Mobile to mobile propagation. Characteristics of basic antenna structures, Antenna at cell
site, Mobile antenna.

Unit – III CHANNEL UTILIZATION AND ITS MANAGEMENT


Frequency Management & Channel Assignment, Hand-Off & Dropped-Calls Frequency Management,
Fixed channel assignment, Non-fixed channel assignment, Traffic & channel assignment, Why hand off ?,
Types of handoff and their characteristics, Dropped call rates & their evaluation.

Unit – IV ERROR DETECTION AND CORRECTION MECHANISMS


Modulation methods and coding for error detection and correction, Introduction to Digital Modulation
techniques, Modulation methods in cellular wireless systems, OFDM, Block Coding, Convolution Coding
and Turbo coding, Multiple Access Techniques: FDMA, TDMA, CDMA, Time-Division Multiple Access
(TDMA), Code Division Multiple Access (CDMA), CDMA capacity, Probability of bit error
considerations, CDMA compared with TDMA.

Unit – V CASE STUDIES ON CELLULAR SYSTEMS


Second generation digital wireless systems, GSM, IS-136 (D-AMPS), IS-95, Mobile Management, Voice
Signal processing and coding.

Text Books :
nd
1. William, C Y Lee, “Mobile Cellular Telecommunications”, 2 Edition McGraw Hill, 2002.
2. Mischa Schwartz, “Mobile Wireless Communications”, Cambridge University Press, 2005.

Reference Books :
nd
1. Theodore S Rapport, “Wireless Communication Principles and Practice”, 2 Edition Pearson
Education, 2002.
2. Lawrence Harte, “3G Wireless Demystified”, McGraw Hill publication, 2002.
3. Kaveh Pahlavan and Prashant Krishnamurthy, “Principles of Wireless Networks”, PHI, 2000.
st
Semester: M.Tech. – 1 Branch: Cyber Forensic & Information Security
Subject: Data-mining And Data-Warehousing Code : 587133(22)
Total Theory Periods: 40 Total Tutorial Periods: 12
Total Marks in End Semester Exam: 100 Minimum number of Class tests to be conducted:
02

UNIT I
Introduction
Relation to statistics, databases, machine learning - Taxonomy of data mining tasks - Steps in data mining
process - Overview of data mining techniques.

UNIT II
Visualization And Statistical Perspectives
Visualization - Dimension reduction techniques - Data summarization methods - Statistical Perspective -
Probabilistic - Deterministic models - Clustering - Regression analysis - Time series analysis – Bayesian
learning.

UNIT III
Predictive Modeling
Predictive Modeling - Classification - Decision trees - Patterns - Association rules - Algorithms.

UNIT IV
Data Warehousing
Design - Dimensional Modeling - Meta data - Performance issues and indexing -VLDB issues –
Development life cycle - Merits.

UNIT V
Applications
Tools - Applications - Case Studies.

Text Books:
1. Jiawei Han, Micheline Kamber, Data Mining Concepts and Techniques, Morgan Kauffmann
Publishers,2000
2. Data warehousing- concepts, Techniques, Products and Applications by Prabhu, Prentice hall of India
References
1. Data Warehousing Fundamentals by Paulraj Ponniah, John Wiley.
2. Usama M.Fayyad, Geogory Piatetsky - Shapiro, Padhrai Smyth and Ramasamy Uthurusamy,
"Advances in Knowledge Discovery and Data Mining", The M.I.T Press, 1996.
3. Sean Kelly, "Data Warehousing in Action", John Wiley & Sons Inc., 1997.
Semester : I Branch: Cyber Forensic & Information Security
Subject: Information Security Lab Code : 587121(22)
Total Lab Periods: 40 Total Marks in End Semester Exam: 75

Experiments to be performed:

1. Working with Sniffers for monitoring network communication (Ethereal)


2. Understanding of cryptographic algorithms and implementation of the same in C or C++
3. Using open ssl for web server - browser communication
4. Using GNU PGP
5. Performance evaluation of various cryptographic algorithms
6. Using IP TABLES on Linux and setting the filtering rules
7. Configuring S/MIME for e-mail communication
8. Understanding the buffer overflow and format string attacks
9. Using NMAP for ports monitoring
10. Implementation of proxy based security protocols in C or C++ with features like confidentiality,
integrity and authentication

References :
· http://linuxcommand.org/man_pages/openssl1.html
· http://www.openssl.org/docs/apps/openssl.html
· http://www.queen.clara.net/pgp/art3.html
· http://www.ccs.ornl.gov/~hongo/main/resources/contrib/gpg-howto/gpg-howto.html
· https://netfiles.uiuc.edu/ehowes/www/gpg/gpg-com-0.htm
· http://www.ethereal.com/docs/user-guide/
st
Semester: – 1 Branch: Cyber Forensic & Information Security
Subject: Digital Signal and Image Processing Lab Code : 587122(22)
Total Lab Periods: 40 Total Marks in End Semester Exam: 75

List of Experiments :

1. Study and Analyze important Signal Processing and Statistics toolbox functions with at least
two types of Signals.
2. Write a Matlab Code for the implementation of Convolution theorem and its applications.
3. Write a Matlab Code for the observation of frequency response and phase response of the
signal.
4. Repeat the above problem for the following cases :
a) Human Speech (Male).
b) Human Speech (Female).
c) Human Speech (Child).
5. Write a Matlab code to observe the Impulse response of different types of signals.
6. Write a Matlab code to implement DFT, FFT, DWT, CWT and DCT of any type of signal.
7. Write a Matlab code of the detection and counting Zero-Crossings of Speech Signal.
8. Write a Matlab code for the study of all types of Windowing techniques and its performance
measures over any signal.
9. Write a Matlab program for the study and analysis of different Biometrical Signal traits of Human
being for the gender, age, and prosodic features.
10. Study and Analyze important Image Processing toolbox functions with at least two standard
images like Cameraman, Lena, Monkey, and others.
11. Write a Matlab Code for Image reading and displaying the results in matrix form and hence
changing the matrix elements by multiplying with the factor 0.001 and hence writing to a file
with extension .jpeg format and hence plot a histogram.
12. Write a Menu driven program for implementing the following :
Converting Color to Gray Scale and hence enhancement with segmentation.
Color Image enhancement and Segmentation.
Comparison of the above two options through Histogram plotting.
Quit with a dialog box for confirmation of yes and No command button.
13. Write a program to hide a word in an image file and retrieve it (Stegnography).
14. Write a Menu driven program for the study and analysis of different Biometrical Images like Iris,
finger print, Human Gait, Human face (frontal), Human face (from Side-view), Human face
(temporal view) and any other Biometrical traits for the implementation of enhancement,
segmentation, and features extraction.
15. Case studies through Matlab on the following :
a) Mapping process for Trained and Test Speech Signal.
b) Mapping process for Trained and Test Images.

Text /Reference Books :


nd
1. Rafael C. Gonzalez & Richard E. Woods, “Digital Image Processing using Matlab”, 2 edition,
Pearson Education, 2004.
2. Vinay K. Ingle, ”Digital Signal Processing through Matlab”, PHI, 2005.
3. A.K. Jain, “Fundamentals of Digital Image Processing”, PHI, 2003.
4. Alan V. Oppenheim & Ronald W. Schafer, “ Digital Signal Processing”, PHI, 2002.

Potrebbero piacerti anche