detecting malicious packet losses ppt

12

Upload: raghavendra-raghav

Post on 21-Apr-2015

331 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Detecting Malicious Packet Losses PPT
Page 2: Detecting Malicious Packet Losses PPT

ABSTRACTIn this paper, we consider the problem of

detectingwhether a compromised router is maliciouslymanipulating its stream of packets.In particularly, we are concerned with a

simple yet effective attack in which a router

selectively drops packets destined for some victim.

Page 3: Detecting Malicious Packet Losses PPT

EXISTING SYSTEMNetwork routers occupy a unique role in modern

distributed systems. They are responsible for cooperatively shuttling packets amongst themselves in order to provide the illusion of a network with universal point-to-point connectivity. However, this illusion is shattered - as are implicit assumptions of availability, confidentiality, or integrity-when network routers are subverted to act in a malicious fashion. By manipulating, diverting, or dropping packets arriving at a compromised router, an attacker can trivially mount denial-of-service, surveillance, or man-in-the-middle attacks on end host systems.

Page 4: Detecting Malicious Packet Losses PPT

PROPOSED SYSTEMWe have designed, developed, and

implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur.

Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions.

Page 5: Detecting Malicious Packet Losses PPT

SYSTEM SPECIFICATIONHardware Requirements: Processor : Pentium IV 2.4 GHz. Hard Disk : 40 GB. RAM : 256 Mb.Software Requirements: Operating system : - Windows XP Coding Language : - Java.

Page 6: Detecting Malicious Packet Losses PPT
Page 7: Detecting Malicious Packet Losses PPT
Page 8: Detecting Malicious Packet Losses PPT
Page 9: Detecting Malicious Packet Losses PPT
Page 10: Detecting Malicious Packet Losses PPT

IMPLEMENTATIONImplementation is the stage of the project when the theoretical design is turned out into working system. Thus it can be considered to be the most critical stage in achieving a successful.

new system and in giving the user, confidence that the new system will work and be effective.

Page 11: Detecting Malicious Packet Losses PPT

CONCLUSIONTo the best of our knowledge, this paper is

the first serious attempt to distinguish between a router dropping packets maliciously and a router dropping packets due to congestion. Previous work has approached this issue using a static user-defined threshold, which is fundamentally limiting.

Page 12: Detecting Malicious Packet Losses PPT

Thank you!!