entropy variation analysis based on monitoring
TRANSCRIPT
![Page 1: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/1.jpg)
ENTROPY VARIATION ANALYSIS BASED ON MONITORING DISTRIBUTED DENIAL OF SERVICE
Name of presentation
![Page 2: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/2.jpg)
ENTROPY VARIATION ANALYSIS BASED ON
MONITORING DISTRIBUTED DENIAL OF
SERVICEPresented by R.Raghav Sri Ramakrishna Engineering CollegeR.Prabhu(III BE-ECE )KGISL Institute of Technology
![Page 3: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/3.jpg)
OBJECTIVE
• A Denial of Service (DoS) attack is a malicious effort to keep authorized users of a website or web service from accessing it, or limiting their ability to do so
• DDoS attacks make a networked system or service unavailable to legitimate users.
3
![Page 4: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/4.jpg)
EXISTING SYSTEM
• The network security community does not have effective and efficient traceback methods to locate attackers
4
![Page 5: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/5.jpg)
DRAWBACKS
• We come to know that the message which has been sent is hacked only after the hacking has been done by the intruders or any other users
• So there is no use in receiving just simply an alert message after our information is hacked
5
![Page 6: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/6.jpg)
PROPOSED SYSTEM
• In this process we would come to know before the hacking is being done
• If any attempt is made by the intruder to hack the data
6
![Page 7: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/7.jpg)
SOFTWARE REQUIREMENTS
• Operating system :Windows XP • Front End : MS Visual
Studio• Back End : MS-SQL server
7
![Page 8: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/8.jpg)
HARDWARE REQUIREMENTS
• Processor : Dual Core• Internal memory : 2GB • Hard Disk Drive : 40 GB
8
![Page 9: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/9.jpg)
MODULES
• The completed projected is segemented into four modules which are as follows
•Sender •Receiver• Intruder•Monitoring stub
9
![Page 10: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/10.jpg)
DATAFLOW DIAGRAM
10
![Page 11: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/11.jpg)
SCREEN SHOTS
11
![Page 12: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/12.jpg)
SENDER
12
![Page 13: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/13.jpg)
13
![Page 14: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/14.jpg)
14
![Page 15: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/15.jpg)
15
![Page 16: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/16.jpg)
16
![Page 17: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/17.jpg)
MONITORING STUB
17
![Page 18: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/18.jpg)
18
![Page 19: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/19.jpg)
19
![Page 20: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/20.jpg)
20
![Page 21: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/21.jpg)
ALARM GENERATION
21
![Page 22: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/22.jpg)
FUTURE ENHANCEMENTS• To implement this project in a wider
network, that is in MAN and WAN
22
![Page 23: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/23.jpg)
SOCIAL NETWORK
• Twitter said attackers compromised 250,000 account.
• Twitter has reset those users’
passwords and sent e-mails.
![Page 24: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/24.jpg)
CURRENT AFFAIR
• The latest attack damaged 32,000 computers and servers at South Korea.
• It infected banks and broadcasters.
![Page 25: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/25.jpg)
ECONOMIC FIGHT
• North Korea were traced to IP addresses in China. An IP address is the number that identifies a network or device on the Internet.
![Page 26: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/26.jpg)
CULPRITS
![Page 27: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/27.jpg)
THREAT ACTION
![Page 28: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/28.jpg)
COMMON PASSWORD
![Page 29: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/29.jpg)
STRONG PASSWORD
![Page 30: Entropy Variation Analysis Based on Monitoring](https://reader036.vdocument.in/reader036/viewer/2022062503/58f342221a28ab94118b458f/html5/thumbnails/30.jpg)
30
THANK YOU