Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
NAME
Anjani Deekshitha A Ravindra Patil Vinay Hiremath Ashwini D
EMAIL
anjanideekshitha@gmail.com ravindrapatil90@gmail.com vini007hiremath@gmail.com ash91legend@gmail.com
MOB NO
9980815287 9538667246 9535535448 9731871968
Introduction
Information security has been purely defensive.
Firewalls, Intrusion Detection Systems, encryption Detect any failures in the defense, and then react to those failures.
Limitation: Is purely defensive, the enemy has the initiative. Solution: Honey nets Honey net gather information about threats that exist.
2
Honeynet
Is a type of honey pot
Problem definition
Hybrid peer to peer architecture to perform attacks. Honeypot technique to defend such kind of malware attacks and avoid the malware attacks like.
Existing scheme
Dos attacks
Botmasters used botnet.
Many disadvantages
Solution: use hybrid peer to peer architecture.
Proposed system:
honey pot technique to defend the attacks.
honey pot to block the packets travelling
Objective
To know about the Hackers Activities and Motivation. To allow the Hackers to hack the network and monitoring the hackers activities. To store the motivation of the hackers in the IDS database. Update the Security using the IDS information.
Data control
Authorized user Access operation
Original Files
Data control
Unauthorized user
Access operation
Duplicate File
Data control
Unauthorized user
10
Data Analysis
Data control Read collected data Analyze hackers action & activity
Data Analysis
Update to performance
Analyze weakness in existing security
11
Authorized user
Unauthorized user
Duplicate file
Data control
12
Data Analysis
Log system
Alert system
Data control
13
1.
2. 3.
User_id
User_Name Password
Number
Text Text
2.
IP Address
Number
Modules
DATA CONTROL DATA CAPTURE DATA COLLECTION DATA ANALYSIS DATA ENCRYPTION / DECRYPTION LOGS AND ALERT SYSTEM
DATA CONTROL: This module provides control from unauthorized Access . It allows authorized user to access the original file system. The Firewall identifies the hackers and divert them to the duplicate File System.
Immediately, an alert is send to Honey Pot & to the Log / Alert system, about the Hacker.
DATA CAPTURE: This module allows to collect the data about the user activities and motivation. It stores the various methods used by the hacker and how is he breaking the security. The data are all stored in the IDS to analyze Hackers activities.
HoneyPot server.
The data are analyzed to know the attacks and hacker motivation.
DATA ANALYSIS: Read the collected data stored in the IDS. Analyze the data to know about the hackers action and how they are succeeded in their activities. Analyze the Weakness of the Existing security. Update the Security to improve performance of the present security.
DATA ENCRYPTION AND DESCRIPTION: Blow Fish involves replacing each letter of the alphabet with the letter standing k places further down the alphabet. Encryption: C = E (p) = (p +k) mod (26). Decryption: P = D(C) =(C-k) mod (26). Where, C = Cipher Text. P = Plain Text. K= Key
LOGS AND ALERT SYSTEM The IDS system collect Hackers motivation for future generation of security. Log system stores all motivation of the hackers in the IDS. Alert provides alert message to administrator regarding attack of the Hacker.
Conclusion
Botnets - potential for illicit financial gain, More honeypot-based detection and defense systems to find ways to avoid honeypot traps in their botnets. Software or hardware specific codes can be used to detect the honeypot virtual environment, Rely on a more general principle to detect botnet This project implements various means by which attackers could detect botnet in their constructed botnet based on this principle.
Bibliography
S. Kandula, D. Katabi, M. Jacob, and A. Berger, Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds, in 2nd Symposium on Networked
Thank You