detecting malicious packet losses
#1

I am shanthi,studying M.E (CSE)......I am in need of the source code for "detecting malicious packet losses".......I request you to kindly send this....It will be very helpful to me....I am awaiting for your response.
Thanking You
Yours Sincerely
shanthi
Reply
#2
Hello everyone this Madhu doing MCA. If anybody has Detecting malicious packet losses project coding kindly send me. This is my Mail id madhunallaveni[at]gmail.com contact no: 09790106306 i will be waiting for your response
with regards,
Madhu
Reply
#3
Hi,
visit these threads for more details on this topic:
http://studentbank.in/report-detecting-m...5#pid15055
http://studentbank.in/report-detecting-m...sses--8198
Reply
#4
Done by:
S .Sujatha
A.Malarkodi
G.Priyadharshini

Cause of Packet Loss

-Packet loss can be caused by a number of factors.
-signal degradation over the network medium.
-corrupted packets rejected in-transit.
-faulty networking hardware.
-faulty network drivers.
Reply
#5

Alper T. Mzrak, Student Member, IEEE, Stefan Savage, Member, IEEE, and
Keith Marzullo, Member, IEEE


Abstract
In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.


INTRODUCTION
THE Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of connecting to the Internet and even well-protected hosts may be crippled with denial-of-service (DoS) attacks. However, while such threats to host systems are widely understood, it is less well appreciated that the network infrastructure itself is subject to constant attack as well. Indeed, through combinations of social engineering and weak passwords, attackers have seized control over thousands of Internet routers. Even more troubling is Mike Lynn’s controversial presentation at the 2005 Black Hat Briefings, which demonstrated how Cisco routers can be compromised via simple software vulnerabilities. Once a router has been compromised in such a fashion, an attacker may interpose on the traffic stream and manipulate it maliciously to attack others—selectively dropping, modifying, or rerouting packets.
Several researchers have developed distributed protocols to detect such traffic manipulations, typically by validating that traffic transmitted by one router is received unmodified by another. However, all of these schemes—including our own—struggle in interpreting the absence of traffic. While a packet that has been modified in transit represents clear evidence of tampering, a missing packet is inherently ambiguous: it may have been explicitly blocked by a compromised router or it may
have been dropped benignly due to network congestion. In fact, modern routers routinely drop packets due to bursts in traffic that exceed their buffering capacities, and the widely used Transmission Control Protocol (TCP) is designed to cause such losses as part of its normal congestion control behavior. Thus, existing traffic validation systems must inevitably produce false positives for benign events and/or produce false negatives by failing to report real malicious packet dropping.
In this paper, we develop a compromised router detection protocol that dynamically infers the precise number of congestive packet losses that will occur. Once the congestion ambiguity is removed, subsequent packet losses can be safely attributed to malicious actions. We believe our protocol is the first to automatically predict congestion in a systematic manner and that it is necessary for making any such network fault detection practical. In the remainder of this paper, we briefly survey the related background material, evaluate options for inferring congestion, and then present the assumptions, specification, and a formal description of a protocol that achieves these goals. We have evaluated our protocol in a small experimental network and demonstrate that it is capable of accurately resolving extremely small and fine-grained attacks.


for more details, please visit
http://cseweb.ucsd.edu/~savage/papers/TPDS09.pdf

Reply
#6
Thumbs Up 
hi i want more information about detecting ma;licious packet losses



lakshmi
Reply
#7
hi! i want the more information of it's project - detecting malicious packet losses.
Reply
#8
i want more information about the detecting malicious packet losses
Reply
#9

to get information about the topic detecting malicious packet losses full report ppt, and related topics refer the page link bellow

http://studentbank.in/report-detecting-m...ses--11712

http://studentbank.in/report-detecting-m...acket-loss

http://studentbank.in/report-detecting-m...ket-losses

http://studentbank.in/report-detecting-m...ses--20238

http://studentbank.in/report-detecting-m...oss?page=2

http://studentbank.in/report-detecting-m...?pid=29436
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: childlobour losses its imptrementation, detecting malicious packet losses using java, download detecting malicious packet losses ppt, detecting malicious packet losses ppt, uml diagrams for detecting malicious programs, viva questions for seperation of losses, ppt slides on detecting malicious packet losses,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  solar power remote control bomb detecting robot pinkyshar 4 4,293 24-07-2013, 02:51 PM
Last Post: G.KARTHIKEYAN
Bug Detecting malicious packet losses ravidanny23 1 1,159 30-03-2013, 10:35 AM
Last Post: computer topic
  Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates deepu1331 3 2,357 31-01-2013, 03:33 PM
Last Post: itnagraja
  detecting malicious packet losses mahadev 12 7,722 01-12-2012, 01:39 PM
Last Post: seminar details
Sad Detecting adverse Drug Reactions 0 420 14-03-2012, 08:40 AM
Last Post: Guest
  detecting malicious packet loss anusuya89 11 9,099 08-03-2012, 03:22 PM
Last Post: misssita
Video a new tcp pr persistence with packet reordering vasu236 1 1,213 01-03-2012, 02:53 PM
Last Post: seminar paper
  controlling ip spoofing through inter domain packet filters haree143 4 3,705 29-02-2012, 12:51 PM
Last Post: seminar paper
  CONTROLLING IP SPOOFING THROUGH INTER DOMAIN PACKET FILTER 1 1,400 29-02-2012, 12:51 PM
Last Post: seminar paper
  A MODEL BASED APPROACH TO EVALUATION OF FEC CODING IN COMBATING NETWORK PACKET LOSSES lavanya.x 1 1,245 20-02-2012, 03:58 PM
Last Post: seminar paper

Forum Jump: