entropy variation analysis based on monitoring

30
ENTROPY VARIATION ANALYSIS BASED ON MONITORING DISTRIBUTED DENIAL OF SERVICE Name of presentation

Upload: rprabhu-rrajendran

Post on 16-Apr-2017

51 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Entropy Variation Analysis Based on Monitoring

ENTROPY VARIATION ANALYSIS BASED ON MONITORING DISTRIBUTED DENIAL OF SERVICE

Name of presentation

Page 2: Entropy Variation Analysis Based on Monitoring

ENTROPY VARIATION ANALYSIS BASED ON

MONITORING DISTRIBUTED DENIAL OF

SERVICEPresented by R.Raghav Sri Ramakrishna Engineering CollegeR.Prabhu(III BE-ECE )KGISL Institute of Technology

Page 3: Entropy Variation Analysis Based on Monitoring

OBJECTIVE

• A Denial of Service (DoS) attack is a malicious effort to keep authorized users of a website or web service from accessing it, or limiting their ability to do so

• DDoS attacks make a networked system or service unavailable to legitimate users.

3

Page 4: Entropy Variation Analysis Based on Monitoring

EXISTING SYSTEM

• The network security community does not have effective and efficient traceback methods to locate attackers

4

Page 5: Entropy Variation Analysis Based on Monitoring

DRAWBACKS

• We come to know that the message which has been sent is hacked only after the hacking has been done by the intruders or any other users

• So there is no use in receiving just simply an alert message after our information is hacked

5

Page 6: Entropy Variation Analysis Based on Monitoring

PROPOSED SYSTEM

• In this process we would come to know before the hacking is being done

• If any attempt is made by the intruder to hack the data

6

Page 7: Entropy Variation Analysis Based on Monitoring

SOFTWARE REQUIREMENTS

• Operating system :Windows XP • Front End : MS Visual

Studio• Back End : MS-SQL server

7

Page 8: Entropy Variation Analysis Based on Monitoring

HARDWARE REQUIREMENTS

• Processor : Dual Core• Internal memory : 2GB • Hard Disk Drive : 40 GB

8

Page 9: Entropy Variation Analysis Based on Monitoring

MODULES

• The completed projected is segemented into four modules which are as follows

•Sender •Receiver• Intruder•Monitoring stub

9

Page 10: Entropy Variation Analysis Based on Monitoring

DATAFLOW DIAGRAM

10

Page 11: Entropy Variation Analysis Based on Monitoring

SCREEN SHOTS

11

Page 12: Entropy Variation Analysis Based on Monitoring

SENDER

12

Page 13: Entropy Variation Analysis Based on Monitoring

13

Page 14: Entropy Variation Analysis Based on Monitoring

14

Page 15: Entropy Variation Analysis Based on Monitoring

15

Page 16: Entropy Variation Analysis Based on Monitoring

16

Page 17: Entropy Variation Analysis Based on Monitoring

MONITORING STUB

17

Page 18: Entropy Variation Analysis Based on Monitoring

18

Page 19: Entropy Variation Analysis Based on Monitoring

19

Page 20: Entropy Variation Analysis Based on Monitoring

20

Page 21: Entropy Variation Analysis Based on Monitoring

ALARM GENERATION

21

Page 22: Entropy Variation Analysis Based on Monitoring

FUTURE ENHANCEMENTS• To implement this project in a wider

network, that is in MAN and WAN

22

Page 23: Entropy Variation Analysis Based on Monitoring

SOCIAL NETWORK

• Twitter said attackers compromised 250,000 account.

• Twitter has reset those users’

passwords and sent e-mails.

Page 24: Entropy Variation Analysis Based on Monitoring

CURRENT AFFAIR

• The latest attack damaged 32,000 computers and servers at South Korea.

• It infected banks and broadcasters.

Page 25: Entropy Variation Analysis Based on Monitoring

ECONOMIC FIGHT

• North Korea were traced to IP addresses in China. An IP address is the number that identifies a network or device on the Internet.

Page 26: Entropy Variation Analysis Based on Monitoring

CULPRITS

Page 27: Entropy Variation Analysis Based on Monitoring

THREAT ACTION

Page 28: Entropy Variation Analysis Based on Monitoring

COMMON PASSWORD

Page 29: Entropy Variation Analysis Based on Monitoring

STRONG PASSWORD

Page 30: Entropy Variation Analysis Based on Monitoring

30

THANK YOU