SRM INSTITUTE OF SCIENCE AND TECHNOLOGY TIRUCHIRAPPALLI
FACULTY OF ENGINEERING AND TECHNOLOGY
SCHOOL OF COMPUTING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CORE COURSE PROJECTS TITLES FOR MORNING (FN) BATCH
Industrial / Real Time Use Case Projects
S. No Project Title CC
Designing Protocol Message Syntax and Structure Using Context-Free
Grammars: How Can This Approach Improve the Accuracy, Reliability, and 1, 2
1.
Security of Parsing in Network Communication Systems?
Design of Finite Automata and Related Computational Models Be Utilized
for Deep Packet Inspection to Accurately Analyze Packet Contents and 1, 2
2.
Detect Malicious Patterns in Network Traffic?
Design the Formal Grammars and Language Hierarchies Be Applied to
3. Analyze, Label, and Categorize Network Traffic for Effective Monitoring 1, 3
and Quality of Service (QoS) Management?
How Can Automata-Based Representations Be Designed and Utilized to
Model the Operations, State Transitions, and Layered Behaviors of Network
4. 1, 2
Protocols for Improved Analysis, Verification, and Understanding of
Communication Processes?
Demonstrates how intrusion detection can be formalized using finite
automata to recognize known attack signatures or deviations from normal 1, 2
5.
behavior.
Design the Behavior of Wide Area Networks (WAN) Be Formally
6. Represented Using State Machine Diagrams to Support Simulation, 1, 2
Verification, and Control of Network Operations?
Exploring the Role of Context-Free Grammars in Defining the Syntax of
7. Complex Protocol Messages for Ensuring Accurate Parsing and Reliable 1, 3
Communication in Network Systems
Design and Application of Formal Grammars and Language Processing
Tools for the Verification of Syntax and Semantic Consistency in Network 1, 2
8.
Configuration Scripts and Files
Design and Application of Regular Language Constraints for Input
Validation in Networked Systems: Preventing Injection Attacks and
9. 1, 2
Ensuring the Structural Integrity of User and Protocol Inputs Through
Formal Syntactic Verification
Adapting Lexical Analysis Tools from Compiler Theory for Token
10. Extraction in Network Packet Streams: A Formal Approach to Identifying 2, 3
and Interpreting Meaningful Data Units in Network Traffic
Design a real-time intrusion detection engine using finite state machines
(FSM) to model malicious traffic patterns. Implement deep packet
11. inspection modules with Spring Boot micro services and visualize attack 1, 2
detection sequences in React. Use IP-based session tracking and represent
alert states with deterministic finite automata (DFA).
Develop a secure packet parser in Spring Boot that uses context-free
grammar (CFG) to validate application-layer protocols like HTTP and
SMTP. Integrate React dashboards to visualize rule matches and violations. 1, 2
12.
Use regular expressions for basic filtering and CFG parsing for nested
structures.
Simulate routing decisions in software-defined networks (SDN) using
Turing Machine models in the backend. Model routing path evaluation as
13. tape operations and measure time complexity. Use Spring Boot for controller 1, 2
logic and React for topology visualization. Evaluate routing decisions based
on state transitions.
Design a backend tool in Spring Boot that captures network traffic and
applies machine learning to infer protocol grammars. Use CFG parsers to
14. reconstruct unknown protocol structures. Visualize protocol states and 1, 2
inferred rules in a React interface. Validate extracted grammars using formal
CFG rules.
Implement a PDA-based validation engine for encrypted HTTP/REST
packets using a Spring Boot backend. Model request parsing logic for deeply
nested JSON/XML structures with stack-based automata. Display parse state 1, 3
15.
transitions and violations in React. Use PDA logic for consistency
enforcement.
Develop a secure SDN policy validator using pushdown automata integrated
with a blockchain ledger. Use Spring Boot for smart contract interaction and
16. 1, 2
PDA logic for real-time validation of route requests. Display routing events,
approvals, and policy states in a React dashboard.
Simulate a future-ready network environment using a theoretical quantum
automata model in the backend. Use Spring Boot to represent state
17. transitions on qubits and probabilistic tape inputs. Visualize protocol 2, 3
simulation and key exchange states in React. Apply quantum logic gates to
test protocol resilience.
Design a recursive descent parser to detect DNS tunneling and
steganography-based attacks. Implement recursive language recognition in
18. Spring Boot backend and visualize flagged domains or payloads in React. 1, 3
Use regular expressions for surface-level checks and recursive language
filters for hidden patterns.
Build a Spring Boot micro service that verifies IoT communications using
layered automata—finite automata for handshake validation and PDA for
1, 3
19. protocol message structure. Represent communication states and errors
visually in React. Use MQTT or CoAP as sample protocols for simulation.
Implement a rule-based firewall engine in Spring Boot where each rule
corresponds to a Chomsky hierarchy grammar. Classify traffic rules as
20. 1, 2
regular, context-free, or context-sensitive and enforce them accordingly. Use
React to display rule categories, traffic logs, and grammar violations.
Design a campus portal to manage student academic activities using Spring
Boot and React. Implement secure peer-to-peer network communication
using IP addressing and simulate subnetting and NAT in the backend
21. 1, 3
services. Use a finite state machine to represent different states of the user
(e.g., login, course registration, exam enrollment). Validate inputs like
registration IDs using regular expressions.
Develop a web-based e-commerce platform for users to browse and purchase
products with full-stack integration. Simulate static and dynamic routing
(e.g., RIP and OSPF) to depict how requests and payments travel across
1, 2
22. distributed servers. Validate product codes using deterministic finite
automata (DFA) and regex. Use layered architecture to model
communication flow between client and server
Build a real-time chat system using Web Sockets and React to support one- 1, 2
23.
to-one and group chats. Simulate message transmission using CSMA/CA
protocol and ensure packet ordering using TCP. Use PDA to recognize
nested message tags (e.g., emojis within brackets). Implement custom hooks
to manage chat states and socket events.
Create a full-stack quiz platform that supports multiple users, question
banks, and result tracking. Use subnetting and routing principles to manage
24. load balancing and access control. Design a grammar-based parser to 1, 3
validate mathematical expressions and answers. Automate quiz flow
transitions using finite automata.
Design a secure online banking portal for managing accounts, transactions,
and statements using Spring Boot. Implement NAT and subnetting to isolate
25. internal banking services and simulate routing via OSPF. Use regular 1, 3
expressions and DFA to validate transaction formats and account IDs.
Visualize transaction logs on a React dashboard.
Build a traffic control system that manages signal lights across multiple
junctions using React and JavaScript. Use FSM to simulate light transitions
and Packet Tracer to demonstrate packet flow between traffic units. Simulate 1, 2
26.
Ethernet and token ring MAC protocols. Store signal data in a backend SQL
database using JDBC.
Develop a secure online voting platform with user authentication and session
handling in Spring Boot. Use classless IP addressing and simulate NAT for
27. 1, 2
private-public voter interaction. Apply DFA to validate voter IDs and ballot
formats. Render dynamic ballot interfaces using React and CSS transitions.
Create a web-based compiler that supports code compilation and error
checking for various languages. Model the underlying communication using
the OSI layers and simulate the TCP/IP data flow. Use a context-free 1, 2
28.
grammar (CFG) to parse code and identify syntax errors. Manage compile
jobs using RESTful APIs and visualize results using React.
Develop a website deployment dashboard that maps user-friendly URLs to
IPs using DNS. Simulate router and switch configurations for hosting using
29. 1, 2
Packet Tracer. Model the URL resolution process using Mealy machines.
Provide a real-time dashboard using JavaScript and React components.
Build a movie booking system where users can select shows and seats with
30. real-time updates. Use packet-switching simulation to manage 1, 2
communication between booking servers. Validate seat codes using regex
and model selection process using FSM. Implement seat map rendering
using dynamic DOM manipulation
Build a lightweight firewall or packet filter that matches incoming packets
1, 2
31. against regex rules.
Farmers often face challenges in accessing markets, leading to lower income
due to middlemen. This gap restricts their ability to sell produce at fair
prices. Description: Create a mobile application that connects farmers
directly with consumers and retailers. The app should include features for
32. 1, 2
listing produce, negotiating prices, and managing transactions, thereby
reducing dependence on intermediaries. Expected Solution: A user-friendly
mobile platform that enables farmers to showcase their products and connect
with buyers directly, enhancing their income potential.
Protocol Verifier using Pushdown Automata-Design a tool that checks
33. whether message sequences in a network protocol follow context-free 1, 3
grammar rules (e.g., HTTP request/response structure).
Develop a secure API gateway that uses context-free grammar parsing to
34. 1, 3
validate incoming JSON/XML API requests before they hit the server.
Build a mini-compiler that converts high-level filter rules (written in a
35. custom DSL) into optimized finite automata that run on a software router to 1, 3
filter packets at line speed.
Build a custom DNS resolver that checks each domain request against a
36. 1, 3
regex-based blacklist (e.g., blocking ads, malware domains).
Create an embedded gateway that verifies whether connected IoT devices
37. send/receive packets matching an allowed automaton or CFG. For example, 1, 3
a smart bulb should not make HTTP POST requests to unknown domains.
Design a simple self-healing protocol where each node models its status as
a finite state machine. If a failure happens, nodes transition states and 1, 2
38.
redistribute data automatically.
Make a prototype load balancer that parses HTTP or custom messages using
1, 3
39. CFG parsing and routes requests to servers based on message type.
Build a VPN add-on that rewrites or pads packets so that deep packet
40. inspectors (DPIs) fail to match normal regex/automata signatures — tests 1, 2
ToC limits in real-world censorship evasion.
Develop an interactive website that visualizes automata theory, such as
DFA, NFA, or Turing Machines, and allows multiple users to collaborate on
41. 1, 2
building and testing automata models. Real-time updates can show how the
automaton changes state as different inputs are given.
Create an interactive web-based quiz system where users can participate in
quizzes, track their progress, and get feedback in real-time. Use finite state
42. 1, 2
machines to manage the progression of questions, handle state transitions
based on user responses, and provide personalized feedback or hints.
Develop an interactive online compiler that uses automata theory to check
the syntax of different programming languages. The system could provide
1, 3
43. real-time feedback on whether code matches the expected grammar and rules
defined by the finite automata.
Create a decentralized peer-to-peer file-sharing system that uses FSMs to
manage the states of file transfers (e.g., pending, uploading, complete,
44. 1, 3
failed). Integrate a front-end interface with real-time status updates and
secure file transfer protocols using computer networks concepts.
Build a full-stack web-based code editor where users can write, edit, and
collaborate on code in real time. Incorporate a Finite State Machine (FSM)
1, 2
45. to validate syntax and ensure the code structure adheres to specified rules,
like recognizing keywords and syntax elements.
Develop an online platform for learning web development, where users
progress through lessons, quizzes, and coding challenges. Use finite state
46. 1, 3
machines to track user progress, unlocking new content based on the
completion of previous tasks or achievements.
Create a web-based traffic light control system simulation, where the state
of the lights (red, yellow, green) is managed by finite state machines. Allow
1, 3
47. users to modify traffic rules and timings interactively, simulating different
traffic scenarios in real-time.
Create a dynamic E-Commerce platform where product listings change
states based on user interaction, inventory updates, and order statuses. Use
48. finite state machines to model states like "in stock," "out of stock," and 1, 3
"discontinued," and allow real-time updates and collaborative features for
product management.
Build a tool for network administrators that simulates and monitors network 1, 2
49.
state transitions using finite state machines. The application could
automatically diagnose common network problems, such as IP conflicts or
routing errors, and suggest corrective actions based on FSM-defined states.
Design a multi-player online game where an AI opponent uses finite
automata to make decisions based on the player’s actions. The system should
50. 1, 2
allow players to collaborate on solving in-game puzzles, where each step
involves analyzing and applying automata theory principles.
“Design and Implementation of a Real-Time Network Traffic Anomaly
51. Detection System Using Deterministic Finite Automata (DFA) for Modeling 1, 2
Protocol Behavior and Identifying Malicious Patterns”
Construct FSMs for the TCP, IP, and UDP layers of the TCP/IP model.
Simulate packet flow through each layer and analyze the state transitions.
52. 1, 3
Demonstrate how protocol violations or connection failures can be identified
through your FSM model.
Design a PDA to validate sequences in a simplified HTTP session. Identify
53. incorrect nesting or incomplete transactions in the request-response structure 1, 2
and flag them as violations.
Train a deep learning model (e.g., CNN, LSTM) using a public intrusion
dataset (e.g., NSL-KDD or CICIDS2017). Evaluate the model's accuracy in
54. 2, 3
identifying malicious network traffic and compare it with a rule-based
baseline.
Build a web-based dashboard using Python (Flask/Django) to display live
network statistics (e.g., active sessions, protocol distribution, packet rate).
1, 3
55. Include a module that highlights traffic anomalies based on custom
thresholds or alerts.
Simulate and compare TCP congestion control algorithms (Tahoe vs. Reno)
56. using NS2 or NS3. Plot congestion windows over time and analyze how each 1, 3
algorithm responds to packet loss.
Model the behavior of MQTT publish/subscribe patterns using FSMs.
57. Simulate normal IoT traffic and flag malformed or excessive publish events 1, 2
that deviate from the expected protocol flow.
Design and implement a deep learning model (such as a CNN, RNN, or
LSTM) that can classify network traffic into benign and malicious classes 1, 2
58.
using features extracted from LAN traffic. Use publicly available datasets
like NSL-KDD or CICIDS2017. Evaluate the performance of the model
using metrics such as accuracy, precision, recall, and F1-score. Deploy the
model in a simulated LAN environment and monitor its ability to detect
intrusions in real time.
Design and implement a cloud-based dashboard that can capture, analyze,
and visualize real-time network traffic metrics such as protocol usage, IP
packet volume, connection status, and anomalies. Use tools like Python
59. (Flask/Django), socket programming, and front-end libraries ([Link], 1, 2
[Link]). Include controls to filter traffic, block IPs, or trigger alerts.
Demonstrate its deployment and real-time performance using simulated or
actual traffic data.
Design and Development of a Finite Automata-Based Firewall for Protocol-
60. Aware Packet Filtering with Interactive Demonstration via a Web-Based 1, 2
Application Interface
Design and Development of a Web-Based TCP Connection Simulator
Utilizing Finite State Machines to Accurately Model, Visualize, and
61. 1, 3
Demonstrate State Transitions in the Transmission Control Protocol
Lifecycle
Design and Implementation of a Web-Based Validation Tool for Network
Protocols Using Automata-Based Models to Analyze, Simulate, and Verify
62. 1, 3
the Structural and Behavioral Correctness of Protocols Such as HTTP and
ARP.
Design and Development of a Regular Expression-Based Intrusion
63. Detection System for Identifying Malicious Patterns in Network Packet 1, 3
Payloads Through Real-Time Deep Packet Inspection.
Design and Development of a Web-Based Chat Application with Integrated
Protocol Message Validation Using Deterministic and Non-Deterministic
1, 3
64. Finite Automata for Ensuring Secure and Syntactically Correct
Communication
Design and Implementation of a Web-Based Network Packet Analyzer
Utilizing Context-Free Grammars to Parse, Interpret, and Validate the
65. 1, 2
Structural Syntax of Protocol Messages for Enhanced Traffic Analysis and
Protocol Compliance Verification
Design and Development of a Web-Based Network Traffic Classification
Application Using Finite State Machines to Analyze and Categorize Traffic 2, 3
66.
Types Based on Behavioral Patterns and Protocol State Transitions".
Implementation of a DNS Resolver with a Recursive Descent Parser for
67. Interpreting DNS Message Formats and Real-Time Demonstration Through 1, 3
an Interactive Web-Based Application Interface
Design and Development of a Secure Messaging Protocol Incorporating
68. Handshake Verification Mechanisms Based on Automata Theory for 2, 3
Ensuring Authenticity and Structured Communication
Design and Simulation of a Dynamic Routing Protocol with Behavioral
69. Verification Using Formal Automata Models and Interactive Demonstration 1, 2
Through a Web-Based Application Interface
Design a smart campus where students log in to access department-specific
services. The network is implemented using suitable topologies and media.
1, 2
70. The login and user validation system uses finite automata for syntax
checking, and the front-end is created with HTML/CSS.
Develop a web-based college admission form that uses JavaScript and React
for validation/UI, context-free grammar rules to enforce correct syntax in
71. 1, 3
form fields, and allocates subnet IP addresses to departments for secure
network access.
Create a distributed student information system where data flows between
departments via dynamic routing protocols. A JDBC + SQL backend
1, 3
72. manages student data. Parsing algorithms validate academic data before
insertion into the database.
Design an IoT-based attendance system where nodes communicate via MAC
layer protocols. Authentication processes are modeled using Turing
73. 1, 2
machines (e.g., for detecting invalid states). The backend is developed using
Spring Boot.
Develop an online library system accessible via domain name (DNS).
Backend microservices manage books, users, and transactions using Spring
1, 3
74. Boot. Use complexity theory to analyze the book search efficiency and
simulate undecidable user behaviors (e.g., infinite book browsing).
Build a smart hostel automation system where room lights/fans are
controlled by Moore/Mealy machines. The network is designed in a hybrid 1, 2
75.
topology and displayed in a web dashboard.
Deploy an online exam system where subnetting is used to manage hall-wise
network IPs. CFG-based grammar checks for mathematical or syntactic
76. 1, 3
correctness of student answers. ReactJS handles question rendering and
submission interface.
Develop a university result portal where data travels through routed paths.
77. Parsing algorithms ensure correctness of result entries. Backend is built with 1, 3
JDBC/SQL for fetching and displaying data.
Design a toll booth system where sensors use Ethernet/Token Ring to detect
vehicles. Turing machines simulate toll amount logic. Spring Boot manages 1, 2
78.
user account and toll history.
Build a student grievance redressal portal where users access status via
Telnet and upload supporting documents via FTP. Decision problems (e.g.,
79. 1, 2
"Can this complaint be resolved automatically?") are simulated using TOC
concepts. Spring Boot backend handles modular tracking.
In a university intranet system, faculty members use a login portal built with
HTML. Depending on their role (HOD, Professor, Assistant Professor), they
gain access to specific modules. The access rights are validated using
1, 2
80. DFA/NFA logic—e.g., only HOD can access student performance analytics.
The network implements circuit switching for secured login sessions and
packet switching for regular dashboard communication.