ANNA UNIVERSITY, CHENNAI – 600 025.
B.E/B. TECH. DEGREE EXAMINATIONS, APRIL/MAY 2025
REGULATIONS – 2021
SIXTH SEMESTER
COMMON TO B. E. - CSE & B. TECH. IT
CCS354 - NETWORK SECURITY
Time: 3 Hours Maximum Marks: 100
1. (a) Write a program to implement the concept of DES. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for
malicious activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
2. (a) Write a program to implement the concept of AES. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
3. (a) Write a program to implement the concept of RC4. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
4. (a) Write a program to implement the concept of RSA. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
5. (a) Write a program to implement the concept of DIFFIE HELLMAN. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
6. (a) Write a program to implement DIGITAL SIGNATURE SCHEMES. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
7. (a) Write a program to implement the concept of SSL to check message integrity
and confidentiality. (60)
(b Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
8. (a) Write a program to implement the concept of DES. (60)
(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (30)
(c) Viva – Voce (10)
9. (a) Write a program to implement of concept of AES. (60)
(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (30)
(c) Viva – Voce (10)
10. (a) Write a program to implement the concept of RC4. (60)
(b) Installation of wireshark and observe data transferred in client-server communication using UDP/TCP
and identify the UDP/TCP datagram.. (30)
(c) Viva – Voce (10)
11. (a) Write a program to implement the concept of RSA. (60)
(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (30)
(c) Viva – Voce (10)
12. (a) Write a program to implement the concept of DIFFIE HELLMAN key exchange. (50)
(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (40)
(c) Viva – Voce (10)
13. (a) Write a program to implement the concept of AES .(60)
(b) Experiment the sniff traffic using ARP poisoning. (30)
(c) Viva – Voce (10)
14. (a) Write a program to implement the concept of RSA. (50)
(b) Experiment the sniff traffic using ARP poisoning (40)
(c) Viva – Voce (10)
15. (a) Write a program to implement the concept of Diffie Hellman key exchange. (60)
b) ) Experiment the sniff traffic using ARP poisoning. (30)
(c) Viva – Voce (10)
16. (a) Write a program to implement any one of symmetric key algorithm. (60)
(b) ) Experiment the sniff traffic using ARP poisoning (30)
(c) Viva – Voce (10)
17. (a) Write a program to implement the concept of RC4. (60)
(b) Experiment the Eavesdropping. (30)
(c) Viva – Voce (10)
18. (a) Write a program to implement the concept of RSA.(50)
(b Experiment the Eavesdropping. (40)
(c) Viva – Voce (10)
19. (a) Write a program to implement the concept of DIFFIE HELLMAN.(50)
(b Experiment the Eavesdropping. (40)
(c) Viva – Voce (10)
20. (a) Write a program to implement the concept of RSA.(50)
(b Experiment the Dictionary attacks. (40)
(c) Viva – Voce (10)
21. (a) Write a program to implement the concept of RC4.(50)
(b Experiment the Dictionary attacks. (40)
(c) Viva – Voce (10)
22. (a) Write a program to implement the concept of Diffie hellman.(50)
(b Experiment the Dictionary attacks. (40)
(c) Viva – Voce (10)
23. (a) Write a program to implement the concept of RSA.(50)
(b Experiment the MITM attacks. (40)
(c) Viva – Voce (10)
24. (a) Write a program to implement the concept of RC4.(50)
(b Experiment the MITM attacks. (40)
(c) Viva – Voce (10)
25. (a) Write a program to implement the concept of RSA.(60)
(b Explore Network Monitoring Tools. (30)
(c) Viva – Voce (10)
26. (a) Write a program to implement the concept of RC4.(60)
(b Explore Network Monitoring Tools. (30)
(c) Viva – Voce (10)
27. (a) Write a program to implement the concept of DIFFIE HELLMAN key exchange.(60)
(b Explore Network Monitoring Tools. (30)
(c) Viva – Voce (10)
28. (a) Write a program to implement the concept of RSA.(60)
(b Study to configure Firewall,VPN. (30)
(c) Viva – Voce (10)
29. (a) Write a program to implement the concept of RC4.(60)
(b Study to configure Firewall,VPN. (30)
(c) Viva – Voce (10)
30. (a) Write a program to implement the concept of DIFFIE HELLMAN.(60)
(b Study to configure Firewall,VPN. (30)
(c) Viva – Voce (10)
INTERNAL EXAMINER EXTERNAL EXAMINER