Académique Documents
Professionnel Documents
Culture Documents
TECHNOLOGICAL
UNIVERSITY
Master of Technology
Cluster : 01
Year : 2015
No. of Credits : 67
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER 1
End Semester
Examination Slot
Course Number
Examination
Internal Marks
Name L-T-P
Duration
Credits
(hours)
Marks
Mathematical Foundations of
A 01CS6101 3-0-0 40 60 3 3
Computing Systems
B 01CS6203 Foundations of Information Security 3-1-0 40 60 3 4
Advanced Data Structures and
C 01CS6105 3-1-0 40 60 3 4
Algorithms
D 01CS6207 Number Theory and Cryptography 3-0-0 40 60 3 3
E Elective I 3-0-0 40 60 3 3
S 01CS6999 Research Methodology 0-2-0 100 2
T 01CS6291 Seminar I 0-0-2 100 2
U 01CS6293 Secure Computing Laboratory - I 0-0-2 100 1
TOTAL 15-4-4 500 300 - 22
Elective I
01CS6151 Data Warehousing & Mining
01CS6153 Data Compression Techniques
01CS6155 Advanced Topics in Distributed Systems
01CS6157 Image Processing
01CS6159 Cloud Computing
2
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER 2
End Semester
Examination Slot
Internal Marks
Name L-T-P
Duration
Credits
(hours)
Marks
A 01CS6202 Network Security 3-1-0 40 60 3 4
Formal Methods in Secure
B 01CS6204 3-0-0 40 60 3 3
Computing
C 01CS6206 Database Security 3-0-0 40 60 3 3
D Elective II 3-0-0 40 60 3 3
E Elective III 3-0-0 40 60 3 3
V 01CS6292 Mini Project 0-0-4 100 2
U 01CS6294 Secure Computing Laboratory - II 0-0-2 100 1
TOTAL 15-1-6 400 300 - 19
Elective II
01CS6252 Access Networks and Cellular Communication
01CS6312 Web Security Testing
01CS6254 Public Key Infrastructure & Trust Management
Elective III
01CS6172 Machine Learning
01CS6174 Advanced Graph Theory
01CS6176 Cyber Laws & Ethics
3
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER 3
End Semester
Examination Slot
Internal Marks
Name L-T-P
Duration
Credits
(hours)
Marks
A Elective IV 3-0-0 40 60 3 3
B Elective V 3-0-0 40 60 3 3
T 01CS7291 Seminar II 0-0-2 100 2
W 01CS7293 Project (Phase 1) 0-0-12 50 6
TOTAL 6-0-14 230 120 - 14
Elective IV
01CS7251 Information Security Policies and Risk Analysis
01CS7253 Information Security Metrics
01CS7313 Biometric Security
01CS7157 Ad-hoc and Sensor Networks
Elective V
01CS7271 Cyber Forensics and Investigation
4
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER 4
End Semester
Examination Slot
Course Number
Examination
Internal Marks
Name L-T-P
Duration
(hours)
Marks
Credit
W 01CS7294 Project (Phase 2) 0-0-23 70 30 12
TOTAL 0-0-23 70 30 - 12
5
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER - I
Syllabus and Course Plan
6
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To understand and apply the fundamental concepts in
a. theorem proving
b. Recurrence relations
c. Counting and probability
d. Probability distributions
e. Special graphs and circuits
f. Important structures
Syllabus
Techniques for theorem proving, Principle of mathematical induction, principle of complete
induction. Recursive definitions, Generating functions, Fundamental principles of counting,
pigeonhole principle, countable and uncountable sets, principle of inclusion and exclusion –
applications, derangements, permutation and combination, theory – Properties of Probability,
Methods of Enumeration, Conditional Probability, Independent Events, Bayes Theorem,
Mathematical Expectation, Random variables Discrete Distribution, Binomial Distribution, Mean
and variance The Poisson Distribution, Continuous Distribution. Uniform and Exponential
Distributions, Normal Distribution, Graphneys and algorithms, Groups and subgroups,
homomorphism theorems, cosets and normal subgroups, Lagrange’s theorem, rings, finite fields.
Expected Outcome
1. Conceptual understanding of the above topics and ability to apply them in practical
situations.
References
1. J. P. Tremblay, R. Manohar, “Discrete Mathematical Structures with Application to
Computer Science”, Tata McGrawHill, 2000.
2. Kenneth H. Rosen, “Discrete Mathematics and its Applications”, 7/e, McGraw Hill Inc,
2011.
3. Robert V. Hogg, Elliot A. Tanis, Meda J. M. Rao,“Probability and Statistical Inference”, 7/e,,
Pearson Education India, 2006.
4. J. Truss, “Discrete Mathematics for Computer Scientists”, 2/e, Addison Wesley, 1999.
Bernard Kolman, Robert C Busby,Sharon Kutler Ross, “Discrete Mathematical Structures”,
2/e, Prentice-Hall India Private Limited, 1996.
7
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
8
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Security Models, Access control mechanisms, Intellectual property rights, Basics of Copy right,
Software vulnerabilities, Malwares, Cryptography Topics: C Attacks, Message Authentication ,
Digital signature, Discrete Logarithmic protocols , Diffie Hellman Key exchange, El-Gamal
encryption, Biometric Authentication
Expected Outcome
1. Conceptual understanding of the principles of information security, its significance and the
domain specific security issues.
2. Gather in depth knowledge in vulnerability possibilities
3. Understand the relevance of security in various domains
.
References
1. Bernard Menezes, “Network security and Cryptography”, Cengage Learning India, 2010.
2. Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian Edition, Tata
McGraw Hill, 2007
3. William Stallings, “Cryptography and Network Security: Principles and Practice”, 6/e
Pearson Education, 2013.
4. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, 2/e, Morgan Kaufmann, 2008.
5. Dieter Gollmann. “Computer Security”, John Wiley and Sons Ltd., 2006.
6. Whitman and Mattord, “Principles of Information Security”, Cengage Learning, 2006.
7. D. Bainbridge, “Introduction to Computer Law”, 5/e, Pearson Education, 2004.
8. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private Communication in a
public World”, 2/e, Prentice Hall, 2002.
9. W. Mao, “Modern Cryptography: Theory & Practice”, Pearson Education, 2004.
10. H. Delfs and H. Knebl, “Introduction to Cryptography: Principles and Applications”,
Springer Verlag, 2002.
9
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
Transport layer security -SSL, SSL Record Layer Protocol. DoS and
DDos attacks-SYN flooding, DDoS Attack Detection and prevention,
VI
Session Hijacking and ARP spoofing, firewalls- Types, Practical issues, 6 20
RFID and E-passport, electronic payment, web services security.
10
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course objectives
Syllabus
Amortized Analysis – aggregate, accounting and potential methods. Advanced data structures:
binomial heap, fibonacci heap, disjoint sets - applications.Number-Theoretic algorithms: maxflow-
mincut theorem, String matching: Overview of Complexity classes Probabilistic algorithms:
Numerical algorithms Las Vegas algorithms, Complexity classes in randomized algorithms – RP,
PP, ZPP, BPP.Geometric Algorithms:
Expected Outcome
Upon successful completion of this course, the student will:
1. have deep conceptual understanding of advanced data structures and their applications
2. know the theory behind various classes of algorithms.
3. be able to design, prove the correctness and analyze new algorithms
References
11
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
Maxflow-mincut theorem 3
push-relabel, relabel-to-front algorithms 3
String matching: Rabin-Karp, Knuth-Morris-Pratt algorithms. 4
IV 15
Overview of Complexity classes – P, NP, Co-NP, NP-hard, NP-complete.
3
Space complexity.
SECOND INTERNAL EXAM
12
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Number theory - Introduction, divisibility, Prime numbers, Modular Arithmetic, factoring and
primality testing, Congruences, Quadratic residue, Euler’s Theorem and Fermat’s Little theorem –,
Wilson’s theorem, Chinese remainder theorem, Groups, Finite fields. One way functions and Two
way function, Trapdoor, Discrete Logarithm, Stream and block cipher, Hash functions, Symmetric
Key Encryption algorithms and Analysis, Public key Cryptosystems, RSA, Rabin and El Gammal
Crypto systems , elliptic curve cryptography, Digital Signature algorithms and Facorization
Algorithms
Expected Outcome
References
1. Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery, “An Introduction to the
Theory of Numbers”, 5/e, Wiley India, New Delhi, 2008.
2. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private Communication in a
public World”, 2/e, Prentice Hall, 2002.
3. William Stallings, “Cryptography and Network Security”, 4/e, Pearson Education India,
2006.
4. Joachim Gathan, Jurgen Gerhard, “Modern Computer Algebra”, 2/e,
Cambridge University Press, 2003.
Cluster: 1 Branch: Computer Science & Engineering Stream: Information Security
13
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
5. Wenbo Mao, “Modern Cryptography: Theory & Practice”, 1/e, Pearson Education India,
2006.
6. Neal Koblitz, “Course on Number Theory and Cryptography”, 2/e, Springer, 2004.
7. Neal Koblitz, “Algebraic Aspects of Cryptography”, Springer Verlag, 2004
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
14
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To understand and practice the fundamental and advanced concepts Data Warehousing and
Data Mining
Syllabus
Data warehousing – OLAP, schema, Data architecture, Data Mining. Mining Tasks, Issues, Metrics,
KDD Vs Data mining, DMQL, Classification Clustering, Association, Web mining, Spatial mining,
temporal mining.
Expected Outcome
1. Ability to explain Data warehousing, OLAP and basic data mining activities
2. Ability to apply data mining algorithms for classification and clustering
3. Ability to explain and apply association rule mining techniques
4. Ability to explain Web mining and Spatial mining
References
1. Margaret H Dunham, “Data Mining – Introductory and Advanced Topics”, Pearson India, 2005.
2. Ian H. Witten, Eibe Frank, Mark A. Hall,” Data Mining: Practical Machine Learning Tools and
Techniques”, 3/e, Morgan Kaufmann, 2011.
3. J. Han, M. Kamber, “Data Mining: Concepts and Techniques”, 2/e, Morgan Kaufman, 2006.
COURSE PLAN
% Marks in End
Hours Allotted
Examination
of Semester
Contents
Module
15
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
16
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. Develop theoretical foundations of data compression, concepts and algorithms for lossy and
lossless data compression, signal modelling and its extension to compression with
applications to speech, image and video processing.
Syllabus
Speech Compression & Synthesis, Image Compression, Video Compression, Fractal techniques,
Comparison of compression algorithms, Implementation of compression algorithms.
Expected Outcome
1. Awareness about various data compression techniques and their practical significance.
2. Ability to apply techniques in practical scenarios.
References
1. David Solomon, Data compression: the complete reference, 2/e, Springer-verlag, New York.
2000.
2. Stephen Welstead, Fractal and wavelet Image Compression techniques , PHI, 1999.
3. Khalid Sayood, Introduction to data compression, Morgan Kaufmann Publishers, 2003.
4. Sleinreitz ―Multimedia System‖ Addison Wesley.
COURSE PLAN
% Marks in End-
Examination
of-Semester
Module
Hours
Contents
17
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
18
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Expected Outcome
1. The student gains insight into conceptual and practical aspects of distributed systems.
2. The student gains a complete understanding of the usage of Hadoop systems.
References
19
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
Map Reduce Types – Input and Output Formats, Map Reduce Features
III – Counters – Sorting – Joins – Side Data Distribution, Administering 15
6
Hadoop – Monitoring – Maintenance.
20
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Introduction -sample image model, sampling and quantization, relationship between pixels –
image geometry; Image transforms :Discrete Fourier transform, properties of 2d-fourier transform
(DFT), other separable image transforms; Image enhancement; Image restoration; Image
compression: image compression standards. Image reconstruction from projections: filtered back
projection algorithms. Point detection, line detection and edge detection in images, Image
segmentation.
Expected Outcome
1. Student gets deeper understanding of principles and techniques and algorithms for digital
image processing
2. Student is able to apply these techniques in practical scenarios
References
1. Rafael C., Gonzalez & Woods R.E., “Digital Image Processing”, Pearson Education.
2. Rosenfeld A. &Kak A.C., “Digital Picture Processing”, Academic Press
3. Jain A.K, “Fundamentals of Digital Image Processing”, Prentice Hall, Eaglewood Cliffs, NJ
4. Schalkoff R. J., “Digital Image Processing and Computer Vision”, John Wiley
5. Pratt W.K., “Digital Image Processing”, John Wiley
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
21
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
22
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Expected Outcome
References
1. Dan C. Marinescu , Cloud computing: Theory and Practice, Morgan Kaufmann, 2013
2. Kai Hwang, Geoffrey C. Fox, Jack J. Dongarra, Distributed and Cloud Computing,: From
Parallel Processing to the Intermnet of Things, 1/e, Morgan Kaufmann , 2011
3. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You
Work and Collaborate Online, Que Publishing, 2008.
4. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for
Ondemand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo
Pty Limited, 2008.
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
23
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
24
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To prepare the student to do the M. Tech project work with a research bias.
2. To formulate a viable research question.
3. To develop skill in the critical analysis of research articles and reports.
4. To analyze the benefits and drawbacks of different methodologies.
5. To understand how to write a technical paper based on research findings.
Syllabus
Expected Outcome
Upon successful completion of this course, students will be able to
1. Understand research concepts in terms of identifying the research problem
2. Propose possible solutions based on research
3. Write a technical paper based on the findings.
References
1. C. R. Kothari, Research Methodology, New Age International, 2004
2. Panneerselvam, Research Methodology, Prentice Hall of India, New Delhi, 2012.
3. J. W. Bames, Statistical Analysis for Engineers and Scientists, Tata McGraw-Hill, New York.
4. Donald Cooper, Business Research Methods, Tata McGraw-Hill, New Delhi.
5. Leedy P. D., Practical Research: Planning and Design, McMillan Publishing Co.
6. Day R. A., How to Write and Publish a Scientific Paper, Cambridge University Press, 1989.
7. Manna, Chakraborti, Values and Ethics in Business Profession, Prentice Hall of India, New
Delhi, 2012.
8. Sople, Managing Intellectual Property: The Strategic Imperative, Prentice Hall ofIndia, New
Delhi, 2012.
25
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
FIRST ASSESSMENT
V
Technical writing - Structure and components, contents of a typical 5
26
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
27
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
To make students
1. Identify the current topics in the specific stream.
2. Collect the recent publications related to the identified topics.
3. Do a detailed study of a selected topic based on current journals, published papers
and books.
4. Present a seminar on the selected topic on which a detailed study has been done.
5. Improve the writing and presentation skills.
Approach
Students shall make a presentation for 20-25 minutes based on the detailed study of
the topic and submit a report based on the study.
Expected Outcome
28
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Syllabus
Experiments are based on but not limited to the topics covered in 01CS6203: Foundations of
Information Security and 01CS6207: Number Theory & Cryptography.
Experiment No
Description
IV RSA Algorithm
IX SMAC implementation
29
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER - II
Syllabus and Course Plan
30
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
2. The student should gain extensive, detailed and critical understanding of the concepts,
issues, principles and theories of computer network security
Syllabus
Cryptographic Algorithms, DES, RSA, Hash function, Secure Hash Algorithm (SHA), Digital
Signature schemes, Key Management, distribution and authentication, Wireless Security, Wireless
LAN IEEE 802.11i, WAP, Security in Application layer, Transport layer and Network layer,
Intrusion detection and firewalls.
Expected Outcome
1. Students should attain the ability to identify security vulnerabilities in a networked
systems
2. Students should attain the ability apply network security algorithms and principles at
different layers in typical networked environment
References
1. William Stallings, “Cryptography and Network Security Principles and Practice”, 5/e,
Pearson Education Asia, 2011.
2. Behrous A. Forouzan, “Cryptography and Network Security”, TMH, 2007.
3. William Stallings, “Network Security Essentials”, 4e, Pearson Education, 2011.
4. Roberta Bragg et. al., “Network Security: The Complete Reference”, TMH, 2008.
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
I DES, Strength of DES, Principles of public key crypto systems, The RSA 15
algorithm, Cryptographic Hash functions- Applications, Requirements, 5
31
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
32
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To understand the formal models, protocols and methods associated with secure
Computing
2. To gather in depth knowledge in formal verification and analysis of security protocols
3. Familiarize with Formal analysis tools for security protocols
Syllabus
Formal models, Security protocols, security properties, protocol vulnerabilities, Introduction to
CSP, Modelling security protocols, modelling an intruder, Protocol goals Non-repudiation,
anonymity, Case study, Overview of FDR, Casper, Encoding protocols and intruders for FDR,
Theorem proving- rank functions, Simplifying transformations on protocols, structural
transformations, Security protocol analysis tools- Familiarization with Dolev-Yao model, BAN logic
Expected Outcome
1. The student gains fundamental knowledge in formal aspects of secure computing.
2. Students are able to formally verify and analyze the protocols.
References
33
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
Formal models: Bell LaPadula, Biba, Clark Wilson, Chinese wall, Role
based, Object oriented, Resource allocation monitor models. 3
I 15
Security protocols, security properties, public key certificates, digital
signatures, protocol vulnerabilities, limits of formal analysis. 4
34
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To understand the fundamental issues and solution approaches related to database security.
2. The student should gain extensive, detailed and critical understanding of the concepts,
issues, principles and theories of Multilevel Secure Database Systems.
3. The student should gain knowledge about security issues in Distributed Systems and
secure Data Warehousing
Syllabus
Introduction to DBMS, security policies for database systems, Discretionary security – security
policy, policy enforcement. Mandatory security – multilevel secure database systems, Secure
distributed and heterogeneous database systems, Secure object and multimedia systems,
Secure data warehousing, data mining for security applications, secure web data management and
digital libraries – threats, security solutions. security for XML, RDF and semantic web.
Expected Outcome
1. The student gains in depth understanding of the principles of database security and ability
to use them in real-world scenarios.
References
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
35
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
36
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. The course describes in detail how communication services are conceived, developed
and deployed in wireless networks.
2. Describes optical access networks, its architecture, routing techniques and types of
passive optical networks.
Syllabus
Mobile Radio Propagation- Propagation Models, Propagation Mechanisms. Path Loss models,
Small scale Multipath Propagation. Parameters of Mobile Multipath Channels , Rayleigh and
Ricean Distributions, level crossing and fading statistics. Wireless Communication Systems and
Standards, WLL, PACS, cellular data services, satellite base wireless systems. Cellular System
Design & Signalling-Channel assignment, cell planning. Power control, erlang capacity, database
and mobility management Interference and system capacity, signalling standards, antennas for
mobile radio. WAP- Architecture, protocols, security issues, Routing Techniques in Ad Hoc
wireless networks. Optical Access Networks: PON Architecture, Broadband PON, Gigabit capable
PON, Ethernet PON, Next generation optical access network, WDM-PON components and
Network Architecture, Hybrid TDM/WDM PON, WDM-PON protocol and Scheduling algorithm.
Hybrid optical wireless access networks: Technologies, architecture, routing algorithm.
Expected Outcome
1. The ability to understand technologies used in wireless and mobile communication
2. Able to understand access network technologies, its architecture, routing techniques and
analyze the working of different types of passive optical networks.
.
References
37
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
38
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To understand the common techniques for penetrating web applications and web servers.
Syllabus
Introduction to security testing Fundamentals, Automating specific tasks with cURL, Seeking
design flaws, Infrastructure mapping and profiling, Scoping the app from a hacker’s perspective
Web Authorization - Understanding authorization, Script Hacking and Defensive Coding, Securing
Databases and Database Access, Denial of Service, Web Application Management, Web Client
Security, Threat Modeling.
Expected Outcome
1. The student gains theoretical and practical insight into web application security.
References
1. Paco Hope, Ben Walther, “Web Security Testing Cookbook: Systematic Techniques to
Find Problems Fast”, O'REILLY media, 2009.
2. Mike Andrews, James A. Whittaker, “How to Break Web Software”, Pearson Education,
2006.
3. David MacKey, “Web Security: For Network and System Administrators”, Cengage
Learning, 2006
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
39
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
40
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
41
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Overview of PKI technology- Basic Security Concepts, Components of PKI-Working with PKI -
Processes in PKI ,PKI architecture, Work Performed by Certificate Authorities, Attacks on CA.
Certificate Management, PKI Management protocols and standards, IPKI enabled services,
Evaluating PKI Solutions, Trust management challenges, taxonomy framework, architecture,
system components, system setting and operations.
Expected Outcome
1. The student gains insight into the technology behind PKI systems and the issues in the design
and deployment of a PKI system.
References
42
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
43
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Expected Outcome
1. The ability apply preprocessing of data by attribute selection, reduction techniques
2. The ability to apply different machine learning methods for practical applications
References
1. Stephan Marsland, Machine Learning : An Algorithmic Perspective, CRC Press, 2009
2. Jiawei Han, Micheline Kamber, Jian Pei, Data Mining Concepts and Techniques, Morgan
Kaufmann Publishers, 2012
3. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Introduction to Data Mining, Pearson
2014
4. Tomm. Mitchell, Machine Learning , McGraw Hill Education (India) Pvt Ltd, 2015
5. Vinod Chandra S S , Anand Hareendran, Artificial Intelligence and Machine Learning, PHI
learning Pvt Ltd, 2014
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
44
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
45
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To impart deeper understanding in advanced concepts in graph theory and their practical
applications.
Graphs, Connectivity and Hamiltonicity, Connectivity, The Center and Edge connectivity- Self
Central Graphs - The Median – Central Paths- Other Generalized Centers, Extremal Distance
Problems, Distance sequences, Matrices, Symmetry, Digraphs, Graph Algorithms, Critical Path
Method
Expected Outcome
1. Students become aware of the advanced concepts of graph theory and gain ability to apply
those concepts in practical scenarios.
References
1. Fred Buckley and Frank Harary , “Distance in Graphs”, Addison – Wesley, 1990.
2. C. R. Flouds: “Graph Theory Applications”, Narosa Publishing House, 1994.
3. Harary F: “Graph Theory”, Addison- Weslwy pub. 1972.
4. Deo N: “Graph Theory with Applications to Engineering and Computer Science”, Prentice
Hall Inc. 1974.
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
46
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
47
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Intellectual Property Rights, Computer contracts and licences, Computer crimes - different forms,
Cyber law in India, IT Act 2000, Offences under IT Act., Protection of IPR in Cyber space in India,
International cyber laws and crimes, Ethical issues in computer security.
Expected Outcome
1. Awareness of the different forms of IPR’s and related rules and regulations, and of the laws
applicable to computer and software related contracts.
2. Exposure to different forms of Cyber crimes and the Indian and International laws to
combat Cyber crimes and facilitate e-commerce.
3. Capability to reason out different situations of ethics faced in the cyber world.
References
1. D. Bainbridge, Introduction to Information Technology Law, 6/e, Pearson Education, 2007.
2. Harish Chander, Cyber Laws and IT Protection, PHI Learning Private Limited, 2012.
3. P. Duggal, Cyber law: the Indian Perspective, Saakshar Law Publications, Delhi, 2005.
4. C. P. Fleeger and S. L. Fleeger, Security in Computing, 3/e, Pearson Education, 2003.
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
48
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
49
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
To make students
Approach
The student shall present two seminars and submit a report . The first seminar shall
highlight the topic, objectives, methodology, design and expected results. The second
seminar is the presentation of the work / hardware implementation.
Expected Outcome
Upon successful completion of the mini project, the student should be able to
1. Identify and solve various problems associated with designing and implementing a
system or application.
2. Test the designed system or application.
50
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Syllabus
Experiments are based on but not limited to topics covered in 01CS6202: Network Security and
01CS6206: Database Security.
Experiments
Experiment No
Description
51
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER - III
Syllabus and Course Plan
52
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Expected Outcome
1. The student gains deeper insight into various aspects of security policies and risk analysis.
References
1. Thomas R. Peltier, “Information Security Policies and Procedures”, 2/e, Auerbach
Publication, New york, 2004.
2. Thomas R. Peltier, “Information Security Risk Analysis”, 2/e, Auerbach Publication, New
york, 2005.
3. Mariagrazia Fugini, Carlo Bellettini, "Information SecurityPolicies and Actions in Modern
Integrated Systems”, Idea Group Publishing, 2004.
4. Detmar W. Straub, Seymour Goodman, Richard Baskerville, “Information Security: Policy,
Processes, and Practices”, M.E. Sharpe, 2008.
5. Evan Wheeler, "Security Risk Management: Building an Information Security Risk
Management Program from the Ground Up", Syngress, 2011.
6. Douglas J. Landoll, “The Security Risk Assessment Handbook”, 2/e, Taylor & Francis
Group, CRC Press.
7. W. Mao, “Modern Cryptography: Theory & Practice”, Pearson Education, 2004.
53
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
54
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. Course provides a wealth of tools, guidelines and inputs for anybody having to deal with
security metrics.
Syllabus
The Art and Science of Security Metrics - Audiences for Security Metrics - Finding Candidate
Metrics - Meta-metrics and the PRAGMATIC approach - Scoring information security metrics
against the PRAGMATIC criteria - Sample Security Metrics
Expected Outcome
1. The student is able to identify, explain and use various information security metrics
References
1. Andrew Jaquith, “Security Metrics: Replacing Fear, Uncertainty, and Doubt”, 1/e, Addison-
Wesley Professional, 2007.
2. Caroline Wong, “Security Metrics, A Beginner's Guide”, 1/e, McGraw-Hill Osborne Media,
2011.
3. Lance Hayden, “IT Security Metrics: A Practical Framework for Measuring Security &
Protecting Data”, 1/e, McGraw-Hill Osborne Media, 2010.
4. Carl Young, “Metrics and Methods for Security Risk Management”, 1/e, Syngress, 2010.
5. W. Krag Brotby CISM, “Information Security Management Metrics: A Definitive Guide to
Effective Security Monitoring and Measurement”, 1/e, Auerbach Publications, 2009.
6. Douglas Landoll, “The Security Risk Assessment Handbook: A Complete Guide for
Performing Security Risk Assessments”, 2/e, Second Edition
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
55
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
56
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Expected Outcome
1. The student will be able to understand the techniques, algorithms and applications
developed for biometrics and apply them to solve real problems.
References
% of Marks in
End-Semester
Examination
Module
Contents
I 15
Functionalities: verification and identification, performance measures,
4
design cycle, applications, security and privacy issues.
57
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
58
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To introduce wireless sensor networks and learn the concepts and principles behind WSN
2. To learn WSN network design, sensor node embedded system design and implementation
3. To understand issues involved in wireless network security
Syllabus
Fundamentals of wireless communication, characteristics of wireless channels, multiple access
techniques, wireless LANs, PANs, WANs, and MANs, Wireless Internet. Introduction to
adhoc/sensor networks, advantages of adhoc/sensor network, issues in adhoc wireless networks,
sensor network architecture, data dissemination and gathering.
MAC Protocols, issues, design goals, classification, SMAC. Routing Protocols : Issues,
classification, QoS and Energy Management, Issues and, classifications, QoS frameworks, need for
energy management, classification, Security in Adhoc wireless Networks.
Expected Outcome
1. The student is familiar with the main standards and specifications of WSNs and identifies
the key building blocks for them.
2. The student can define and explain the essential challenges of resourceconstrained WSN
design and implementation, including applications, interfaces, energyefficient protocols and
platform functionalities.
3. The student can apply both theoretical and practical tools for WSN design and utilization
and design potential application scenarios for WSNs.
References
1. C. Siva Ram Murthy, B. S. Manoj, "AdHoc Wireless Networks ", Pearson Education, 2008.
2. Feng Zhao, LeonidesGuibas, "Wireless Sensor Networks ", Elsevier, 2004.
3. Jochen Schiller, "Mobile Communications ", 2/e, Pearson Education, 2003.
4. William Stallings, "Wireless Communications and Networks ", Pearson Education, 2004.
01CS7157 – COURSE PLAN
% of Marks in
Hours Allotted
EndSemester
Examination
Module
Contents
I Introduction: Fundamentals of wireless communication technology, the 15
electromagnetic spectrum, radio propagation mechanisms, 3
characteristics of wireless channels.
Multiple access techniques, Wireless LANsFundamentals of WLANS, 6
Cluster: 1 Branch: Computer Science & Engineering Stream: Computer Science & Engineering
59
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
MAC protocols for sensor network, location discovery, SMAC. 4
Routing Protocols: Issues in designing a routing protocol. 2
IV Classification of routing protocols, Destination Sequenced Distance 15
Vector routing protocol, Dynamic Source Routing Protocol. 4
SECOND INTERNAL EXAM
QoS: Concept, Issues and challenges in providing QoS,
4
V QoS –Classifications. 20
MAC layer solutions, QoS frameworks for Adhoc Wireless networks
5
QoS Models ,INSIGNIA , INORA .
Energy Management need for energy management, classification. 2
VI Security in Adhoc wireless networksNetwork security Requirements, 20
Issues and challenges in security provisioning, Network Security 3
Attacks.
END SEMESTER EXAM
Cluster: 1 Branch: Computer Science & Engineering Stream: Computer Science & Engineering
60
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Cyber Forensic Tools and Utilities, Concealment Techniques, Digital Forensic Laboratory
Accreditation Standards,, Privacy and Cyber Forensics, Forensic Value and Corporate Exposure.
Cyber Forensics and the Law, Electronically Stored Information and Cyber Forensics,Protocol
Analysis, Packet Analysis, Flow Analysis, Higher-Layer Traffic Analysis, Statistical Flow Analysis,
Wireless: Network Forensics, The IEEE Layer 2 Protocol Series, Wireless Access Points (WAPs),
Wireless Event Log Aggregation, Correlation, and Analysis Web Proxy Functionality , Evidence ,
Squid , Web Proxy Analysis, Encrypted Web Traffic, Network Tunneling , Network Behavior of
Malware, The Future of Malware and Network Forensics
Expected Outcome
1. The student will be able to understand the different procedures of cyber forensics
analysis.
2. The student will be able to carry out cyber forensic analysis.
References
1. Albert Marcella, Jr., LLC; Doug Menendez, “Cyber Forensics: A Field Manual for
Collecting, Examining, and Preserving Evidence of Computer Crimes”, 2/e, CRC Press,
2007.
2. Cory Altheide, Harlan Carvey, “Digital Forensics with Open Source Tools”, 1/e, Syngress,
2011.
3. Sherri Davidoff, Jonathan Ham, “Network Forensics: Tracking Hackers through
Cyberspace”, 1/e, Prentice Hall, 2012.
4. John Sammons, “The Basics of Digital Forensics: The Primer for Getting Started in Digital
Forensics, 1/e, Syngress, 2012.
5. Harlan Carvey , “Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for
Windows 7”, 3/e, Syngress, 2012.
61
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
62
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Syllabus
Expected Outcome
1. The student gains knowledge in advanced aspects of information security
References
1. Bernard Menezes, “Network security and Cryptography”, Cengage Learning India, 2010.
2. Dieter Gollmann, “ Computer Security”, John Wiley and Sons Ltd., 2006
3. Charles P Pfleeger, Shari Lawrence Pfleeger. “Security in Computing”, Education, 2005
4. H. Delfs and H. Knebl. “Introduction to Cryptography: Principles and Applications”,
SpringerVerlag, 2002
5. Whitman and Mattord. “Principles of Information Security”, Cengage Learning, 2006
6. Furnell, Katsikas, Lopez, Patel. “Securing Information and Communication
Systems: Principles, Technologies and Applications”, Artech House Inc., 2008.
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
63
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Attacks on DES and RSA- Side channel attack, small exponent attack ,
Public Key Cryptography Standard (PKCS) 3
64
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
1. To familiarize and gain deeper knowledge about the various concepts and techniques of
securing networks
Syllabus
The Art and Science of Security Metrics - Audiences for Security Metrics - Finding Candidate
Metrics - Meta-metrics and the PRAGMATIC approach - Scoring information security metrics
against the PRAGMATIC criteria - Sample Security Metrics
Expected Outcome
1. The student understands the various challenges faced in securing networks and learns
about the approaches to overcome the same
References
1. Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent and Ronald W. Ritchey,
“Inside Network Perimeter Security”, 2/e, Pearson Education, 2005.
2. Cliff Riggs, “Network Perimeter Security: Building Defense InDepth”, Auerbach
Publications, 2003.
3. Michael J. Arata, "Perimeter Security", McGrawHill Professional, 2005.
4. E. Cole, R. Krutz, and J. Conley, “Network Security Bible”, Wiley Dreamtech, 2005.
5. M. Bishop, “Computer Security: Art and Science”, Pearson Education, 2003.
COURSE PLAN
Hours Allotted
% of Marks in
End-Semester
Examination
Module
Contents
65
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
66
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
To make students,
1. identify a domain of interest (may be the same as the one chosen in 01CS7191 or
related to 01CS7193)
2. identify sufficient number of latest good quality research papers on a particular
problem or allied problems
3. do extensive study and analysis of the problem and solution(s)
4. Prepare a comprehensive report
5. make a presentation (20-25 minutes) based on the report
Syllabus
.
No specific Syllabus
Expected Outcome
To student
1. gets good exposure to a domain of interest and the research problems in the
domain
2. (optionally) supplements the work done in 01CS7191
3. improves his/her writing and presentation skills
67
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
To make students
Approach
The student has to present two seminars and submit an interim Project report. The first
seminar would highlight the topic, objectives, methodology and expected results. The first
seminar shall be conducted in the first half of this semester. The second seminar is the
presentation of the interim project report of the work completed and scope of the work
which has to be accomplished in the fourth semester.
Expected Outcome
Upon successful completion of the project phase 1, the student should be able to
1. Identify the topic, objectives and methodology to carry out the project.
2. Finalize the project plan for their course project.
68
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
SEMESTER - IV
Syllabus and Course Plan
69
Kerala Technological University
Master of Technology – Curriculum, Syllabus & Course Plan
Course Objectives
Approach
There shall be two seminars (a mid term evaluation on the progress of the work and pre
submission seminar to assess the quality and quantum of the work). At least one technical paper
has to be prepared for possible publication in journals / conferences based on their project work.
Expected Outcome
Upon successful completion of the project phase II, the student should be able to
1. Get a good exposure to a domain of interest.
2. Get a good domain and experience to pursue future research activities.
70