Sei sulla pagina 1di 24

A New Data Sharing Environment for a Secured Enterprise

Under the guidance of

Mrs. Chethana R Murthy


Assistant Prof, Dept of ISE RV College of Engineering By
USN
1RV08IS006 1RV08IS038 1RV08IS059 1RV09IS401

NAME
Anjani Deekshitha A Ravindra Patil Vinay Hiremath Ashwini D

EMAIL
anjanideekshitha@gmail.com ravindrapatil90@gmail.com vini007hiremath@gmail.com ash91legend@gmail.com

MOB NO
9980815287 9538667246 9535535448 9731871968

Introduction
Information security has been purely defensive.

Firewalls, Intrusion Detection Systems, encryption Detect any failures in the defense, and then react to those failures.
Limitation: Is purely defensive, the enemy has the initiative. Solution: Honey nets Honey net gather information about threats that exist.
2

Honeynet
Is a type of honey pot

Is a high-interaction honey pot designed to capture


extensive information on threats.

It provides real systems, applications, and services for


attackers to interact with.

Gains information about both external and internal


threats of an organization.
3

Problem definition
Hybrid peer to peer architecture to perform attacks. Honeypot technique to defend such kind of malware attacks and avoid the malware attacks like.

Existing scheme

Dos attacks
Botmasters used botnet.

Many disadvantages
Solution: use hybrid peer to peer architecture.

Proposed system:
honey pot technique to defend the attacks.
honey pot to block the packets travelling

honey pot to defend malware attacks


hybrid peer to peer architecture

Objective
To know about the Hackers Activities and Motivation. To allow the Hackers to hack the network and monitoring the hackers activities. To store the motivation of the hackers in the IDS database. Update the Security using the IDS information.

Data flow Diagrams

Data control
Authorized user Access operation

Original Files

Data control

Unauthorized user

Access operation

Firewall & honey pot

Duplicate File

Data Capture & Data Collection


Authorized user

Data control

Data Capture & Data Collectio n

Store user activity & motivation

Various analysis methods

Unauthorized user

IDS to capture host activities

10

Data Analysis

Data control Read collected data Analyze hackers action & activity

Data Analysis

Data Capture & Data Collecti on

Update to performance
Analyze weakness in existing security

11

Data Encryption & Decryption

Access resource file


Data Analysis

Encrypt & decrypt a file

Encryp tion & decrypt ion

Authorized user

Original file IDS

Data Capture & Data Collectio n

Unauthorized user

Duplicate file

Data control

Access resource file

Encrypt & decrypt a file

12

Log & Alert System

Data Analysis

Encrypt ion & decrypti on

Log system

Store hackers motivation

Log & alert System

IDS to generate future security


Provide alert message to admin

Data Capture & Data Collecti on

Alert system
Data control

13

Data Construct Specification


Name of the table: Login
S. No FIELD NAME DATA TYPE SIZE 40 50 30

1.
2. 3.

User_id
User_Name Password

Number
Text Text

Name of the table: Resources


S. No 1. 2. 3. FIELD NAME ID, key Source File Duplicate File DATA TYPE Number Text Text SIZE 20 250 250

Name of the table: IPadress


S. No 1. FIELD NAME User ID DATA TYPE Number SIZE 40 32

2.

IP Address

Number

Modules
DATA CONTROL DATA CAPTURE DATA COLLECTION DATA ANALYSIS DATA ENCRYPTION / DECRYPTION LOGS AND ALERT SYSTEM

DATA CONTROL: This module provides control from unauthorized Access . It allows authorized user to access the original file system. The Firewall identifies the hackers and divert them to the duplicate File System.

Immediately, an alert is send to Honey Pot & to the Log / Alert system, about the Hacker.

DATA CAPTURE: This module allows to collect the data about the user activities and motivation. It stores the various methods used by the hacker and how is he breaking the security. The data are all stored in the IDS to analyze Hackers activities.

DATA COLLECTION: Data from Various HoneyPot are colleted in a centralized

HoneyPot server.
The data are analyzed to know the attacks and hacker motivation.

DATA ANALYSIS: Read the collected data stored in the IDS. Analyze the data to know about the hackers action and how they are succeeded in their activities. Analyze the Weakness of the Existing security. Update the Security to improve performance of the present security.

DATA ENCRYPTION AND DESCRIPTION: Blow Fish involves replacing each letter of the alphabet with the letter standing k places further down the alphabet. Encryption: C = E (p) = (p +k) mod (26). Decryption: P = D(C) =(C-k) mod (26). Where, C = Cipher Text. P = Plain Text. K= Key

LOGS AND ALERT SYSTEM The IDS system collect Hackers motivation for future generation of security. Log system stores all motivation of the hackers in the IDS. Alert provides alert message to administrator regarding attack of the Hacker.

Conclusion
Botnets - potential for illicit financial gain, More honeypot-based detection and defense systems to find ways to avoid honeypot traps in their botnets. Software or hardware specific codes can be used to detect the honeypot virtual environment, Rely on a more general principle to detect botnet This project implements various means by which attackers could detect botnet in their constructed botnet based on this principle.

Bibliography
S. Kandula, D. Katabi, M. Jacob, and A. Berger, Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds, in 2nd Symposium on Networked

Systems Design and Implementation (NSDI), May 2005.


C. T. News, Expert: Botnets No. 1 emerging Internet threat, 2006, http://www.cnn.com/2006/TECH/internet/01/31/furst/. F. Freiling, T. Holz, and G. Wicherski, Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, CS Dept. of RWTH Aachen University, Tech. Rep. AIB-2005-07, April 2005. D. Dagon, C. Zou, and W. Lee, Modeling botnet propagation using time zones, in Proceedings of 13th Annual Network and Distributed System Security
23

Symposium (NDSS), Feburary 2006, pp. 235249.

Thank You

Potrebbero piacerti anche