Network Security Lab Practical File
Experiment 1: Installation and Comparison of Various Antivirus Software
Objective:
The objective of this experiment is to install different antivirus software on a system and perform a
comparative study based on parameters such as installation ease, user interface, virus detection
rate, resource consumption, scanning speed, and unique features.
Introduction:
In the modern digital age, malicious software, or malware, poses a significant threat to computer
systems. Antivirus software is designed to detect, prevent, and remove such threats. With a wide
variety of antivirus tools available, it becomes important to evaluate and compare them for practical
use. This experiment evaluates popular antivirus software including Avast, Kaspersky, and
Bitdefender.
Software and Tools Used:
- Windows 10 Operating System
- Internet connection
- Antivirus Software: Avast, Kaspersky, Bitdefender
Procedure:
1. Installed antivirus software one at a time.
2. Explored the user interface of each.
3. Conducted full system scans.
4. Evaluated unique features and system performance impact.
5. Recorded the scan duration and resource usage.
Observations:
| Parameter | Avast | Kaspersky | Bitdefender |
|-------------------------|----------------|------------------|----------------|
| Installation Time | 5 mins | 7 mins | 6 mins |
| Scan Duration | 20 mins | 25 mins | 18 mins |
| Threats Detected |5 |7 |6 |
| RAM Usage | Moderate | High | Low |
| UI Rating (1-5) |4 | 3.5 | 4.5 |
Conclusion:
Antivirus software is essential for securing computer systems. Avast offers balance, Kaspersky
offers advanced protection, and Bitdefender is light and efficient.
Experiment 2: Installation and Study of Various Parameters of Firewall
Objective:
To install and study the configuration and parameters of a firewall and understand its role in network
security.
Introduction:
A firewall acts as a barrier that monitors and controls network traffic based on predetermined
security rules. Firewalls can be hardware-based or software-based and are crucial in preventing
unauthorized access.
Procedure:
1. Enabled Windows Defender Firewall.
2. Installed ZoneAlarm for comparison.
3. Configured inbound and outbound rules.
4. Observed system behavior with different settings.
Observations:
| Parameter | Windows Firewall | ZoneAlarm |
|---------------------|------------------|------------------|
| Ease of Use | Simple | User-friendly |
| Custom Rules | Manual | Guided |
| Alerts | Basic | Detailed |
Conclusion:
Firewalls provide essential protection. ZoneAlarm offers detailed control; Windows Firewall is
simpler and integrates well.
Experiment 3: Writing Program in C to Encrypt/Decrypt using XOR Key
Objective:
To understand symmetric encryption using XOR operation.
Code Snippet:
#include <stdio.h>
#include <string.h>
int main() {
char str[100];
char key = 'K';
printf("Enter the message: ");
gets(str);
for(int i = 0; i < strlen(str); i++) {
str[i] ^= key;
}
printf("Encrypted: %s\n", str);
for(int i = 0; i < strlen(str); i++) {
str[i] ^= key;
}
printf("Decrypted: %s\n", str);
return 0;
}
Sample Output:
Input: Hello
Encrypted: #%&&(
Decrypted: Hello
Conclusion:
XOR encryption is a simple method demonstrating symmetric encryption principles.
Experiment 4: Study of VPN (Virtual Private Network)
Objective:
To understand VPN technology and its secure communication functionality.
Introduction:
VPNs create secure tunnels over public networks, encrypting data and masking IP addresses. Used
for privacy, security, and remote access.
Procedure:
1. Installed ProtonVPN.
2. Connected to various servers.
3. Verified IP change and access to restricted content.
Observations:
| Parameter | Without VPN | With VPN (USA) |
|-------------------|----------------|------------------|
| IP Address | Local ISP IP | US Server IP |
| Access | Limited | Unrestricted |
| Encryption | No | Yes |
Conclusion:
VPNs ensure secure, encrypted, and private communication across the internet.
Experiment 5: Study of Various Hacking Tools
Objective:
To explore tools used in ethical hacking and penetration testing.
Tools Studied:
- Nmap: Network scanner
- Wireshark: Packet analyzer
- Metasploit: Exploitation tool
- John the Ripper: Password cracker
Procedure:
1. Used Nmap for network scan.
2. Captured packets with Wireshark.
3. Simulated exploit with Metasploit.
4. Cracked test passwords with John the Ripper.
Observations:
| Tool | Use | Output |
|------------|-------------------|---------------------------|
| Nmap | Port scanning | Open ports |
| Wireshark | Packet analysis | HTTP login captured |
| Metasploit | Exploits | Gained test shell |
Conclusion:
Hacking tools, when ethically used, improve security by identifying and mitigating vulnerabilities.
Experiment 6: Practical Applications of Digital Signature
Objective:
To study how digital signatures work and their practical applications.
Introduction:
Digital signatures use asymmetric cryptography for secure communication. They ensure message
integrity, authentication, and non-repudiation.
Procedure:
1. Created private/public key using OpenSSL.
2. Signed a text file.
3. Verified signature using public key.
Applications:
- E-Governance
- Secure emails
- Software distribution
- Financial transactions
Conclusion:
Digital signatures are crucial in modern cybersecurity for validating the integrity and origin of digital
messages.