detecting malicious packet loss
#6
[attachment=9970]
Detecting Malicious Packet Losses
Abstract

In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user -defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions.
Existing System
1. Previous detection protocols have tried to address this problem with a user -defined threshold: too many dropped packets imply malicious intent.
2. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks.
Limitation of Existing System
1. Thus, existing traffic validation systems must inevitably produce false positives for benign events and/or produce false negatives by failing to report real malicious packet dropping.
2. Previous work has approached this issue using a static user-defined threshold, which is fundamentally limiting.
Proposed System
1. We are designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur.
2. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions.
Advantage
Finally, our own work broke the problem into three pieces:
1. A traffic validation mechanism
2. A distributed detection protocol
3. And a rerouting countermeasure.
Hardware Requirements:
PROCESSOR : PENTIUM IV 2.6 GHz
RAM : 512 MB
MONITOR : 15”
HARD DISK : 20 GB
CDDRIVE : 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS
Software Requirements:

FRONT END : JAVA, SWING
TOOLS USED : JFRAME BUILDER
OPERATING SYSTEM: WINDOWS XP
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: detecting malicious packet losses github,
Popular Searches: loss models from data to decisions solutions, packet loss in manet ppt with seminar report, detecting malicious packet loss 100 projects, detecting malicious packet loss uml diagrams, packet loss graph, lieb loss analysis download, fba disruptive,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
detecting malicious packet loss - by anusuya89 - 23-03-2010, 09:32 AM
RE: detecting malicious packet loss - by seminar class - 10-03-2011, 04:20 PM
RE: detecting malicious packet loss - by misssita - 08-03-2012, 03:22 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  allocation of dg in 33 bus system by loss sensitivity factor method 2 1,487 22-08-2015, 02:11 PM
Last Post: seminar report asees
  solar power remote control bomb detecting robot pinkyshar 4 4,296 24-07-2013, 02:51 PM
Last Post: G.KARTHIKEYAN
Bug Detecting malicious packet losses ravidanny23 1 1,161 30-03-2013, 10:35 AM
Last Post: computer topic
  Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates deepu1331 3 2,361 31-01-2013, 03:33 PM
Last Post: itnagraja
  detecting malicious packet losses mahadev 12 7,787 01-12-2012, 01:39 PM
Last Post: seminar details
Sad Detecting adverse Drug Reactions 0 420 14-03-2012, 08:40 AM
Last Post: Guest
Video a new tcp pr persistence with packet reordering vasu236 1 1,227 01-03-2012, 02:53 PM
Last Post: seminar paper
  controlling ip spoofing through inter domain packet filters haree143 4 3,709 29-02-2012, 12:51 PM
Last Post: seminar paper
  CONTROLLING IP SPOOFING THROUGH INTER DOMAIN PACKET FILTER 1 1,404 29-02-2012, 12:51 PM
Last Post: seminar paper
  A MODEL BASED APPROACH TO EVALUATION OF FEC CODING IN COMBATING NETWORK PACKET LOSSES lavanya.x 1 1,250 20-02-2012, 03:58 PM
Last Post: seminar paper

Forum Jump: