entropy variation analysis based on monitoring
TRANSCRIPT
ENTROPY VARIATION ANALYSIS BASED ON MONITORING DISTRIBUTED DENIAL OF SERVICE
Name of presentation
ENTROPY VARIATION ANALYSIS BASED ON
MONITORING DISTRIBUTED DENIAL OF
SERVICEPresented by R.Raghav Sri Ramakrishna Engineering CollegeR.Prabhu(III BE-ECE )KGISL Institute of Technology
OBJECTIVE
• A Denial of Service (DoS) attack is a malicious effort to keep authorized users of a website or web service from accessing it, or limiting their ability to do so
• DDoS attacks make a networked system or service unavailable to legitimate users.
3
EXISTING SYSTEM
• The network security community does not have effective and efficient traceback methods to locate attackers
4
DRAWBACKS
• We come to know that the message which has been sent is hacked only after the hacking has been done by the intruders or any other users
• So there is no use in receiving just simply an alert message after our information is hacked
5
PROPOSED SYSTEM
• In this process we would come to know before the hacking is being done
• If any attempt is made by the intruder to hack the data
6
SOFTWARE REQUIREMENTS
• Operating system :Windows XP • Front End : MS Visual
Studio• Back End : MS-SQL server
7
HARDWARE REQUIREMENTS
• Processor : Dual Core• Internal memory : 2GB • Hard Disk Drive : 40 GB
8
MODULES
• The completed projected is segemented into four modules which are as follows
•Sender •Receiver• Intruder•Monitoring stub
9
DATAFLOW DIAGRAM
10
SCREEN SHOTS
11
SENDER
12
13
14
15
16
MONITORING STUB
17
18
19
20
ALARM GENERATION
21
FUTURE ENHANCEMENTS• To implement this project in a wider
network, that is in MAN and WAN
22
SOCIAL NETWORK
• Twitter said attackers compromised 250,000 account.
• Twitter has reset those users’
passwords and sent e-mails.
CURRENT AFFAIR
• The latest attack damaged 32,000 computers and servers at South Korea.
• It infected banks and broadcasters.
ECONOMIC FIGHT
• North Korea were traced to IP addresses in China. An IP address is the number that identifies a network or device on the Internet.
CULPRITS
THREAT ACTION
COMMON PASSWORD
STRONG PASSWORD
30
THANK YOU