ABSTRACT:

In this paper, we have a tendency to think about the problem of detecting whether or not a compromised router is maliciously manipulating its stream of packets. In specific, we are involved with a straightforward yet effective attack in that a router selectively drops packets destined for some victim. Unfortunately, it's quite challenging to attribute a missing packet to a malicious action because traditional network congestion can produce the identical effect. Modern networks routinely drop packets when the load quickly exceeds their buffering capacities. Previous detection protocols have tried to deal with this drawback with a user-defined threshold: too several dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and can actually produce unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, primarily based on measured traffic rates and buffer sizes, the quantity of congestive packet losses that can occur. Once the anomaly from congestion is removed, subsequent packet losses can be attributed to malicious actions. We tend to have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions - 2017 ABSTRACT: Online social networks (OSNs) gradually integrate monetary capabilities by enabling the usage of real and virtual
PROJECT TITLE :Stickler: Defending against Malicious Content Distribution Networks in an Unmodified BrowserABSTRACT:Web site publishers will derive enormous performance advantages and price savings by directing traffic to their
PROJECT TITLE :Data Lineage in Malicious EnvironmentsABSTRACT:Intentional or unintentional leakage of confidential information is undoubtedly one amongst the foremost severe security threats that organizations face in the digital
PROJECT TITLE :Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior PatternsABSTRACT:Recently, on-line looking integrating third-party payment platforms (TPPs) introduces new security
PROJECT TITLE :Modeling malicious activities in cyber spaceABSTRACT:Cyber attacks are an unfortunate part of society as an increasing quantity of critical infrastructure is managed and controlled via the Internet. So as to protect

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry