entropy variation analysis based on monitoring

Post on 16-Apr-2017

48 Views

Category:

Software

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

ENTROPY VARIATION ANALYSIS BASED ON MONITORING DISTRIBUTED DENIAL OF SERVICE

Name of presentation

ENTROPY VARIATION ANALYSIS BASED ON

MONITORING DISTRIBUTED DENIAL OF

SERVICEPresented by R.Raghav Sri Ramakrishna Engineering CollegeR.Prabhu(III BE-ECE )KGISL Institute of Technology

OBJECTIVE

• A Denial of Service (DoS) attack is a malicious effort to keep authorized users of a website or web service from accessing it, or limiting their ability to do so

• DDoS attacks make a networked system or service unavailable to legitimate users.

3

EXISTING SYSTEM

• The network security community does not have effective and efficient traceback methods to locate attackers

4

DRAWBACKS

• We come to know that the message which has been sent is hacked only after the hacking has been done by the intruders or any other users

• So there is no use in receiving just simply an alert message after our information is hacked

5

PROPOSED SYSTEM

• In this process we would come to know before the hacking is being done

• If any attempt is made by the intruder to hack the data

6

SOFTWARE REQUIREMENTS

• Operating system :Windows XP • Front End : MS Visual

Studio• Back End : MS-SQL server

7

HARDWARE REQUIREMENTS

• Processor : Dual Core• Internal memory : 2GB • Hard Disk Drive : 40 GB

8

MODULES

• The completed projected is segemented into four modules which are as follows

•Sender •Receiver• Intruder•Monitoring stub

9

DATAFLOW DIAGRAM

10

SCREEN SHOTS

11

SENDER

12

13

14

15

16

MONITORING STUB

17

18

19

20

ALARM GENERATION

21

FUTURE ENHANCEMENTS• To implement this project in a wider

network, that is in MAN and WAN

22

SOCIAL NETWORK

• Twitter said attackers compromised 250,000 account.

• Twitter has reset those users’

passwords and sent e-mails.

CURRENT AFFAIR

• The latest attack damaged 32,000 computers and servers at South Korea.

• It infected banks and broadcasters.

ECONOMIC FIGHT

• North Korea were traced to IP addresses in China. An IP address is the number that identifies a network or device on the Internet.

CULPRITS

THREAT ACTION

COMMON PASSWORD

STRONG PASSWORD

30

THANK YOU

top related