+ All Categories
Home > Documents > Krishna Design Part Ppt

Krishna Design Part Ppt

Date post: 23-Oct-2014
Category:
Upload: bachu-lokesh
View: 102 times
Download: 0 times
Share this document with a friend
Popular Tags:
14
Abstract Internet Protocol (IP) traceback is the enabling technology to control Internet crime. FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. The motivation of this traceback system is from DDoS defense. Currently a large number of the notorious Distributed Denial of Service (DDoS) attack incidents make people aware of the importance of the IP traceback technique. IP traceback is the ability to trace the IP packets to their origins. It provides a security system with the ability to identify the true sources of the attacking IP packets. It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems
Transcript
Page 1: Krishna Design Part Ppt

Abstract

• Internet Protocol (IP) traceback is the enabling technology to control Internet crime.

• FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others.

• FDPM adopts a flexible mark length strategy to make it compatible to different network

environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme.

• The motivation of this traceback system is from DDoS defense. Currently a large number of the notorious Distributed Denial of Service (DDoS) attack incidents make people aware of the importance of the IP traceback technique.

• IP traceback is the ability to trace the IP packets to their origins. It provides a security system with the ability to identify the true sources of the attacking IP packets.

• It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems

Page 2: Krishna Design Part Ppt

EXISTING SYSTEM

• More importantly, without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong.

• In an existing system, it is imposible to determine its termination

• In this, we can’t provide the guarantees to construct the attack graph, with specified level of confidence.

Disadvantages

• Cannot find out Packet travel Path.

• Packet can be lost and Duplicate packets can be Received at the Receiver.

• Receiver does not have the original packet.

• Because of the More no of Duplication message received at the receiver.

Page 3: Krishna Design Part Ppt

PROPOSED SYSTEM

•The FDPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination.

•The most significant merit of the FDPM algorithm is that when the algorithm terminates it guarantees that the constructed attack graph is correct, with a specified level of confidence.

•We carry out simulations on the FDPM algorithm and show that the FDPM algorithm can guarantee the correctness of the constructed attack graph.

Advantages

•Different probabilities that a router marks the attack packets .

•Easy to find out packet loss and Duplicatepackets.

•Find out each and every packet path

Page 4: Krishna Design Part Ppt

About the project

•We present a novel and practical IP trace back system called Flexible Deterministic Packet Marking (FDPM).

•FDPM provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network.it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. .•FDPM requires a moderately small number of packets to complete the Trace back process.FDPM can trace a large number of sources in one trace back process with low false positive rates.

•The built-in overload prevention mechanism makes this system capable of achieving a good trace back result even when the router is heavily loaded.

Page 5: Krishna Design Part Ppt

Use case diagramnodes creation

links creation

setup network

<<includes>>

<<includes>>

PacketMarkingFDPM

processpacket

Page 6: Krishna Design Part Ppt

Class diagramMarkGenerator

ipaddressmarkinfo[]

generate()returnmarkinginfo()

Router

idipaddress[]name

receive()send()

Node

idipaddressname

construct packet()send()receive()processpacket()

BackBoneRouterEdgeRouter

packetmarking()

Packet

iddatarftypesrcaddressdestaddressheader

setXXX()getXXX()

EntryRegister

record[][]digest[]

add()check()delete()constructsource()

MessageDigest(from securi ty)

Page 7: Krishna Design Part Ppt

Sequence DaigramAttacker:Node :EdgeRouter :BackBone

Router:EdgeRouter Victim:Node :EntrRegister:Message

Diagest:MarkGenerator

Constructpacket

instantiates (ipaddres)instantiates

constructgenerate markinfo

digestinfo

add markinfo in the packet

sendreceive

send

receive

send

instantiates

add entry

check entries

return sourceip

Page 8: Krishna Design Part Ppt

Collaboration Diagram

:MarkGenerator

Attacker:Node

:EdgeRouter

:BackBoneRouter

Victim:Node

:MessageDiagest

:EntrRegister

1: Constructpacket

2:

3: instantiates (ipaddres)

4: instantiates

5: construct

6: generate markinfo7: digestinfo

8: add markinfo in the packet

9: send

10: receive11: send

12:

13: receive14: send

15:

16: instantiates17: add entry18: check entries

19: return sourceip20:

Page 9: Krishna Design Part Ppt

Activity diagram

sender

Route request

route status

update information Transfermessage

Receiver Reply

path having mis behaviour

path is found

Page 10: Krishna Design Part Ppt

Component Daigram

tools.jar

mysql-connector.jar

FDPM.jar

Page 11: Krishna Design Part Ppt

E-R Daigram

Page 12: Krishna Design Part Ppt

RequirementsHardware requirements

Processor : Any Processor above 500 Mhz. Ram : 128Mb

Hard Disk : 10 Gb

Input device : Standard Keyboard and Mouse.

Output device : Monitor (VGA and High Resolution)

Software requirements

Operating System : Windows server 2000 family

Techniques : JDK 1.5 ÂÂ

Front End : Java Swing.

Implementation : Socket in Java.

Page 13: Krishna Design Part Ppt

QUERIES Time

Page 14: Krishna Design Part Ppt

THANKING YOU


Recommended