Sei sulla pagina 1di 12

NETWORK MONITORING AND APPS INTRUDER DETECTION

SYSTEM

MUHAMMAD AKMAL B ABDUL RAHMAN


BIT (HONS) IN COMPUTER SYSTEM SECURTY
2015

52261212303

UNIVERSITI KUALA LUMPUR


SEPTEMBER 2015

NETWORK MONITORING AND APPS INTRUDER DETECTION


SYSTEM

MUHAMMAD AKMAL B ABDUL RAHMAN

52261212303

Report Submitted to Fulfill the Partial Requirement

For the Bachelor of Information Technology (Hons) in


Computer System Security
Universiti Kuala Lumpur

SEPTEMBER 2015

DECLARATION

I declare that this report is my original work and all references have been cited
adequately as required by the University.

Date: 31/12/2015

Signature
Full Name: MUHAMMAD
AKMAL BIN ABDUL RAHMAN
ID Number: 52261212303

APPROVAL PAGE

We have supervised and examined this report and verify that it meets the
program and Universitys requirement for the Bachelor of Information Technology
(HONS) in Computer System Security

Date: 31/12/2015

Date: 31/12/2015

Signature:
Supervisor: Wan Hazimah
Binti Wan Ismail
Official Stamp:

Signature:
Accessors: Delina Beh Mei Yin
Official Stamp:

ACKNOWLEDGEMENT
4

In the name of Allah, The Most Gracious, The Most Merciful, and Him alone are
worthy of all praise.
It is not possible for me to acknowledge individually the debt that I owe to who
had made their contribution in preparing and writing this research project
proposal. I would like to thank many people who helped me.
Special thank go to my supervisor, Pn. Wan Hazimah bt Wan Ismail for her
wonderful support, guidance and cooperation that had been given to me through
out the compilation of this project. I would also express my gratitude to Pn. Wan
Hazimah who also my coordinator that had been guiding the writing of this report
from the beginning.
I would like to thank my family and my friends for their deepest concern and
investment during the course of this project. All of you are my strength and thank
for everything. Thanks for all contribution and idea helped to succession this
project.
I would like to extend my sincere thanks to my fellow classmates and
housemates, dedicated officially to System Security lecture and the others for
contributing and supporting me directly and indirectly.
Thank you, may Allah SWT bless all of you.

LIST OF TABLES
Page No
Table 2.1 Comparison Existing Application... ........................................18
Table 3.1 Costing.33
Table 4.1 Software Requirement...36
Table 4.2 Hardware Requirement..36
Table 5.1 Detection on ARP Spoofing..50
Table 5.2 Monitoring Wireless Network....51
5

Table 5.3 Wi-Fi Disabling52


Table 5.4 Notification Area..53

LIST OF FIGURES
Page No
Figure 2.1 Android Framework......................................11
Figure 2.2 Wi-Fi Intruder Pro ...........13
Figure 2.3 Wi-Fi Intruder Pro.....14
Figure 2.4 Wi-Fi Inspector.
............15
Figure 2.5 Swinedroid.16
Figure 3.1 Rapid Application Development (RAD)..
.............22
Figure 3.2 System Architecture.....30
Figure 3.3 System Flow Chart...31
Figure 3.4 Sketches of the Project...........32
Figure 4.1 System Structure..37
Figure 4.2 System Flow Chart...38
Figure 4.3 Interface Design (Administration)......39
Figure 4.4 Interface Design (Warning) ....40
Figure 4.5 Admin Page...41
Figure 4.6 Warning Page.......41
Figure 4.7 Android Manifest Page....41
Figure 4.8 ARP Table Monitor...42
Figure 4.9 Check Network.....42
Figure 4.10 Wi-Fi Monitor..43
Figure 4.11 Main Page (Not Running)....44
Figure 4.12 Main Page (Running)....45
Figure 4.13 Notification Area....46
Figure 4.14 Warning Page....47
Figure 5.1 Cain and Abel Spoofing..52
Figure 5.2 Cain and Abel Full-Routing Spoofing...53

ABSTRACT
The smartphone owner population is growing. Multi-functionality, portability, and
connectivity are opening doors for learning. Most smartphones can access the
Internet, have a touchscreen user interface, can run third-party apps, music
players and are camera phones. By accessing internet everywhere, they did not
realize that they are exposed to vulnerabilities. It seems like every week we hear
about a smartphone security flaw. Whether it's a massive bug in android, apps
leaking your location data to the public, or insecure passcodes on our phones,
smartphone security isn't taken seriously. Smartphone user should aware with
what they do with their phone because they do not know that someone is
watching them, this project bring closer to the security of mobile phone. Building
an application that at least can help user secure 5 out of 10 flaws in mobile
security especially the famous attack nowadays that we know as man in the
middle attack. Ace intruder application will assist user in monitoring their network
7

while they enjoying surfing the internet freely using wireless connection. Once
the application detecting any intrusion it will automatically turn off the current
wireless network to prevent from credentials data being stole. This application
will increase awareness to smartphone user to be more alert while accessing
internet in public wireless connection.

CONTENT
Page No
DECLARATION...............................................................................................................iii
APPROVAL PAGE.iv
ACKNOWLEDGEMENT..v
LIST OF TABLESvi
LIST OF FIGURES..vi
ABSTRACTviii

CHAPTER 1: INTRODUCTION

Page No

1.1 Introduction.............................................................................................................1
1.2 Project Background................................................................................................2
1.3 Problem Statement.................................................................................................2
1.4 Objective.................................................................................................................3
1.5 System Scope........................................................................................................3
1.5.1 Application Functional.............................................................................4
1.6 Significance of the project......................................................................................4
8

CHAPTER 2: LITERATURE REVIEW

Page No

2.1 Introduction.............................................................................................................5
2.2 Wireless Intrusion Detection System.....................................................................6
2.2.1 Problem with Wireless Network Structure....................................................6
2.3 Distributed Denial of Services (DDoS)...................................................................8
2.4 MAC Spoofing........................................................................................................9
2.5 ARP Spoofing.......................................................................................................10
2.6 Android..................................................................................................................11
2.7 Review of Existing Application.............................................................................13
2.7.1 Wi-Fi Intruder..............................................................................................13
2.7.2 Wi-Fi Inspector...........................................................................................15
2.7.3 Swinedroid..................................................................................................16
2.8 Comparison of Existing Application......................................................................18
2.8 Conclusion...
...19

CHAPTER 3: METHODOLOGY

Page

No
9

3.1 Introduction...........................................................................................................20
3.2 Rapid Application Development...........................................................................21
3.2.1 Phase 1 : Analysis Design & Quick Design................................................23
3.2.2 Phase 2 : Development (Build, Demonstrate & Refine).............................26
3.2.3 Phase 3 : Testing........................................................................................28
3.2.4 Phase 4 : Implementation & Release.......................................................29

3.3 System Architecture...30


3.4 System Flow
Chart.....31
3.5 Proposed Project Sketches..32
3.6 Project Costing...33
3.7 Conclusion.
..34

CHAPTER 4: PROTOTYPE DEVELOPMENT

Page No

4.1 Introduction.35
4.2 Overview of Product
Development.35
4.3 System Requirement.35
4.4 System Structure...37
4.4.1 System Model Structure..
.37
4.5 System Flow Chart...38
4.6 System Development...39
10

4.6.1 System Design..


.39
4.6.2 Develop of System Functionalities..40
4.6.3 System User Interface..43
4.7 Conclusion.
...48

CHAPTER 5: TESTING AND RESULT


5.1 Introduction..49
5.2 Testing
Method...49
5.2.1 Functional Testing...50
5.3 Conclusion...54

CHAPTER 6 CONCLUSION AND RECOMMENDATION


6.1 Introduction55
6.2 Objective Achievement55
6.2.1 Project Objective...55

11

6.3 Strengths and Limitations...56


6.3.1 Project Strength56
6.3.2 Project Limitation..57
6.4 Future Enhancement (Recommendation)57
6.5 Conclusion...58

REFERENCE...........................................................................................................59
APPENDICES
APPENDIX A: Gantt Chart....................................................................................61

12

Potrebbero piacerti anche