Madhav First Review

Embed Size (px)

Citation preview

  • 7/29/2019 Madhav First Review

    1/19

  • 7/29/2019 Madhav First Review

    2/19

    The shared nature of the medium in wirelessnetworks makes it easy for an adversary tolaunch a Wireless Denial of Service (WDoS)attack.

    Recent studies, demonstrate that suchattacks can be very easily accomplished usingoff-the shelf equipment.

    To give a simple example, a malicious nodecan continually transmit a radio signal in

    order to block any legitimate access to themedium and/or interfere with reception

  • 7/29/2019 Madhav First Review

    3/19

    ABSTRACT(Continued):This act is called jamming and the maliciousnodes are referred to as jammers.Jamming techniques vary from simple ones

    based on the continues transmission of

    interference signals, to more sophisticatedattacks that aim at exploiting vulnerabilities ofthe particular protocol used.

    A detailed up-to-date discussion on the

    jamming attacks recorded in the literaturewill be discussed in this project.

  • 7/29/2019 Madhav First Review

    4/19

    ABSTRACT(Continued):

    This project also describe varioustechniques proposed for detecting the

    presence of jammers.Finally, the project conclude with a

    summary and by suggesting future

    directions.

  • 7/29/2019 Madhav First Review

    5/19

    SECURITY is one of the critical attributes ofany communication network. Various attackshave been reported over the last many years.

    Most of them, however, target wired

    networks. Wireless networks have onlyrecently been gaining widespreaddeployment.

    At the present time, with the advances in

    technology, wireless networks are becomingmore affordable and easier to build

  • 7/29/2019 Madhav First Review

    6/19

    EXISTING SYSTEM(Continued)

    Many metropolitan areas deploy public

    WMANs for people to use freely.

    Moreover, the prevalence of WLANs as

    the basic edge access solution to the

    Internet is rapidly becoming the reality.

    However, wireless networks are

    accompanied with an important security

    flaw; they are much easier to attack than

    any wired network

  • 7/29/2019 Madhav First Review

    7/19

    This project describes some ofthe most harmful attacks that

    can be launched by a jammer.We develop such one system,to show the effect of the dos

    attack.

  • 7/29/2019 Madhav First Review

    8/19

    PROPOSED SYSTEM (Continued)

    In the project proposed system, the

    normal client and server process is

    initially depicted, then the attack is

    launched manually to show how the

    dos attack affect the normalclient/server process.

  • 7/29/2019 Madhav First Review

    9/19

    At this moment of time the Location

    Guard will find the abnormalbehavior of packets and filter the

    packets that are related to jammers.

    PROPOSED SYSTEM (Continued)

  • 7/29/2019 Madhav First Review

    10/19

    The most common set of requirements definedby any operating system or softwareapplication is the physical computer resources,also known as hardware. The hardware

    requirements required for this project are: 20 GB of Hard disk 256 MB RAM Pentium 133 MHZ or above (Processor)

    PCs which are interconnected in LAN Network Adapter card configured with an IP

    address

  • 7/29/2019 Madhav First Review

    11/19

    Software Requirements deal withdefining software resourcerequirements and pre-requisites thatneed to be installed on a computer to

    provide optimal functioning of anapplication. These requirements orpre-requisites are generally notincluded in the software installation

    package and need to be installedseparately before the software isinstalled.

  • 7/29/2019 Madhav First Review

    12/19

    SOFTWARE REQUIREMENTS (Continued)

    The software requirements for thisproject are:Java 1.3 or later versionsWindows 98 or later versions

  • 7/29/2019 Madhav First Review

    13/19

    Client Application DoS attack

    File Server

    Location Guard Normal Client

  • 7/29/2019 Madhav First Review

    14/19

    Construct Rout

    Find pathAdministrator

    Filter packet

    Recieve Packet

    Send Packet

    User

    Use case Diagram of DoS Attack System

  • 7/29/2019 Madhav First Review

    15/19

    NodeS

    +msg: string+path: String

    +Browse()+Possible Path()+Feasible Path()

    +Send()+Receive()+discard()

    Routing

    +Nwid: integer+Cost: integer+path: String

    +find NextHop()+findcost()+Construct Route()

    UserInterface

    +Attribute1

    +InitializeComponent()+AddComponent()+jButton1_actionperformed()+jButton2_actionperformed()+jButton3_actionperformed()

    +jButton4_actionperformed()+jButton5_actionperformed()+jcomboBox_actionPerformed()

    NodeD

    +msg: String+path:String

    +Browse()+Possiblepath()+feasiblepath()

    +send()+Receive()+discard()

    UserInterface

    +Attribute1

    +InitializeComponent()+AddComponent()+jButton1_actionperformed()+jButton2_actionperformed()+jButton3_actionperformed()+jButton4_actionperformed()+jButton5_actionperformed()+jcomboBox_actionPerformed()

    Routing

    +Nwid: integer+Cost: integer+path: String

    +find NextHop()+findcost()+Construct Route()

    Class Diagram of Proposed Project

  • 7/29/2019 Madhav First Review

    16/19

    NodeS NodeB NodeD

    1 : Find Next Hop()

    2 : Findcost()

    3 : Constuct Route()

    Sequence diagram for Constructing route

  • 7/29/2019 Madhav First Review

    17/19

    : Administrator

    NodeS NodeD

    1 : Browse()

    2 : Find Feasible path()

    3 : Select packet()

    4 : Send packet()

    Sequence Diagram for Sending Packet

  • 7/29/2019 Madhav First Review

    18/19

    : Administrator

    NodeS NodeD

    1 : Browse()

    2 : Find Feasible Path()

    3 : Sendpacket()

    4 : Filter packet()

    5 : Recieve packet()

    6 : Packet Recived()

    Sequence Diagram for successfully Reciving Packet

  • 7/29/2019 Madhav First Review

    19/19

    Konstantinos Pelechrinis, Marios Iliofotou andSrikanth V. Krishnamurthy, Denial of ServiceAttacks in Wireless Networks: The Case of

    Jammers, IEEE Communications Surveys &Tutorials, Vol. 13, No.2, Second Quarter2012.