Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SYSTEM
52261212303
52261212303
SEPTEMBER 2015
DECLARATION
I declare that this report is my original work and all references have been cited
adequately as required by the University.
Date: 31/12/2015
Signature
Full Name: MUHAMMAD
AKMAL BIN ABDUL RAHMAN
ID Number: 52261212303
APPROVAL PAGE
We have supervised and examined this report and verify that it meets the
program and Universitys requirement for the Bachelor of Information Technology
(HONS) in Computer System Security
Date: 31/12/2015
Date: 31/12/2015
Signature:
Supervisor: Wan Hazimah
Binti Wan Ismail
Official Stamp:
Signature:
Accessors: Delina Beh Mei Yin
Official Stamp:
ACKNOWLEDGEMENT
4
In the name of Allah, The Most Gracious, The Most Merciful, and Him alone are
worthy of all praise.
It is not possible for me to acknowledge individually the debt that I owe to who
had made their contribution in preparing and writing this research project
proposal. I would like to thank many people who helped me.
Special thank go to my supervisor, Pn. Wan Hazimah bt Wan Ismail for her
wonderful support, guidance and cooperation that had been given to me through
out the compilation of this project. I would also express my gratitude to Pn. Wan
Hazimah who also my coordinator that had been guiding the writing of this report
from the beginning.
I would like to thank my family and my friends for their deepest concern and
investment during the course of this project. All of you are my strength and thank
for everything. Thanks for all contribution and idea helped to succession this
project.
I would like to extend my sincere thanks to my fellow classmates and
housemates, dedicated officially to System Security lecture and the others for
contributing and supporting me directly and indirectly.
Thank you, may Allah SWT bless all of you.
LIST OF TABLES
Page No
Table 2.1 Comparison Existing Application... ........................................18
Table 3.1 Costing.33
Table 4.1 Software Requirement...36
Table 4.2 Hardware Requirement..36
Table 5.1 Detection on ARP Spoofing..50
Table 5.2 Monitoring Wireless Network....51
5
LIST OF FIGURES
Page No
Figure 2.1 Android Framework......................................11
Figure 2.2 Wi-Fi Intruder Pro ...........13
Figure 2.3 Wi-Fi Intruder Pro.....14
Figure 2.4 Wi-Fi Inspector.
............15
Figure 2.5 Swinedroid.16
Figure 3.1 Rapid Application Development (RAD)..
.............22
Figure 3.2 System Architecture.....30
Figure 3.3 System Flow Chart...31
Figure 3.4 Sketches of the Project...........32
Figure 4.1 System Structure..37
Figure 4.2 System Flow Chart...38
Figure 4.3 Interface Design (Administration)......39
Figure 4.4 Interface Design (Warning) ....40
Figure 4.5 Admin Page...41
Figure 4.6 Warning Page.......41
Figure 4.7 Android Manifest Page....41
Figure 4.8 ARP Table Monitor...42
Figure 4.9 Check Network.....42
Figure 4.10 Wi-Fi Monitor..43
Figure 4.11 Main Page (Not Running)....44
Figure 4.12 Main Page (Running)....45
Figure 4.13 Notification Area....46
Figure 4.14 Warning Page....47
Figure 5.1 Cain and Abel Spoofing..52
Figure 5.2 Cain and Abel Full-Routing Spoofing...53
ABSTRACT
The smartphone owner population is growing. Multi-functionality, portability, and
connectivity are opening doors for learning. Most smartphones can access the
Internet, have a touchscreen user interface, can run third-party apps, music
players and are camera phones. By accessing internet everywhere, they did not
realize that they are exposed to vulnerabilities. It seems like every week we hear
about a smartphone security flaw. Whether it's a massive bug in android, apps
leaking your location data to the public, or insecure passcodes on our phones,
smartphone security isn't taken seriously. Smartphone user should aware with
what they do with their phone because they do not know that someone is
watching them, this project bring closer to the security of mobile phone. Building
an application that at least can help user secure 5 out of 10 flaws in mobile
security especially the famous attack nowadays that we know as man in the
middle attack. Ace intruder application will assist user in monitoring their network
7
while they enjoying surfing the internet freely using wireless connection. Once
the application detecting any intrusion it will automatically turn off the current
wireless network to prevent from credentials data being stole. This application
will increase awareness to smartphone user to be more alert while accessing
internet in public wireless connection.
CONTENT
Page No
DECLARATION...............................................................................................................iii
APPROVAL PAGE.iv
ACKNOWLEDGEMENT..v
LIST OF TABLESvi
LIST OF FIGURES..vi
ABSTRACTviii
CHAPTER 1: INTRODUCTION
Page No
1.1 Introduction.............................................................................................................1
1.2 Project Background................................................................................................2
1.3 Problem Statement.................................................................................................2
1.4 Objective.................................................................................................................3
1.5 System Scope........................................................................................................3
1.5.1 Application Functional.............................................................................4
1.6 Significance of the project......................................................................................4
8
Page No
2.1 Introduction.............................................................................................................5
2.2 Wireless Intrusion Detection System.....................................................................6
2.2.1 Problem with Wireless Network Structure....................................................6
2.3 Distributed Denial of Services (DDoS)...................................................................8
2.4 MAC Spoofing........................................................................................................9
2.5 ARP Spoofing.......................................................................................................10
2.6 Android..................................................................................................................11
2.7 Review of Existing Application.............................................................................13
2.7.1 Wi-Fi Intruder..............................................................................................13
2.7.2 Wi-Fi Inspector...........................................................................................15
2.7.3 Swinedroid..................................................................................................16
2.8 Comparison of Existing Application......................................................................18
2.8 Conclusion...
...19
CHAPTER 3: METHODOLOGY
Page
No
9
3.1 Introduction...........................................................................................................20
3.2 Rapid Application Development...........................................................................21
3.2.1 Phase 1 : Analysis Design & Quick Design................................................23
3.2.2 Phase 2 : Development (Build, Demonstrate & Refine).............................26
3.2.3 Phase 3 : Testing........................................................................................28
3.2.4 Phase 4 : Implementation & Release.......................................................29
Page No
4.1 Introduction.35
4.2 Overview of Product
Development.35
4.3 System Requirement.35
4.4 System Structure...37
4.4.1 System Model Structure..
.37
4.5 System Flow Chart...38
4.6 System Development...39
10
11
REFERENCE...........................................................................................................59
APPENDICES
APPENDIX A: Gantt Chart....................................................................................61
12