SlideShare une entreprise Scribd logo
1  sur  12
Presented By :
                    SYED FARAZ ALI
                    MOHAMMED MOOSA KHAN
                    KALYANSHETTY
                    MOHD NAJEEB JANI




Under The Guidance of:

                Prof .Rajshekhar Gaithond
CONTENTS



Introduction
Aim
Existing System
Proposed System
Advantages of Proposed System
Software Specifications
Hardware Specification
Conclusion
References

                                 2
   The open nature of the wireless medium leaves it vulnerable to
    interference attacks, typically referred to as jamming.

   This interference attacks can be used for performing Eavesdropping &
    Denial-of-Service attacks on wireless networks.

   While eavesdropping can be prevented using cryptographic methods,
    jamming attacks are much harder to counter. They have been shown to
    actualize Denial-of-Service (DoS) attacks against wireless networks.

   Typically, jamming has been addressed under an external threat model. in
    which the jammer is not part of the network. Under this model, the
    adversary interferes with the reception of messages by transmitting a
    continuous jamming signal.

   In this Work, we address the problem of jamming under an internal threat
    model. We consider a sophisticated adversary who is aware of network
    secrets and the implementation details of network & exploits his
    knowledge for launching selective jamming attacks in which specific
    messages of “high importance” are targeted.

                                                                               3
   To Show that Selective Jamming Attacks can be
    Launched By Performing Real-Time Packet
    Classification at Physical layer.

   To Prevent these attacks develop schemes that
    prevent Real-Time packet classification by
    combining Cryptographic Primitives with Physical
    layers attributes.




                                                       4
   Jamming attacks are much harder to counter and
    has more security problems.

   In the simplest form of jamming, the adversary
    interferes with the reception of messages by
    transmitting a continuous jamming signal , or
    several short jamming pulses.

   jamming attacks have been considered under an
    external threat model, in which the jammer is not
    part of the network. Under this model, jamming
    strategies include the continuous or random
    transmission of highpower interference signals.


                                                        5
   In the proposed system, we address the problem of
    jamming under an internal threat model.

   We consider a sophisticated adversary who is aware of
    network secrets and the implementation details of
    network protocols.

   The adversary exploits his internal knowledge for
    launching selective jamming attacks in which specific
    messages of “high importance” are targeted.

   For example, a jammer can target route-request/route-
    reply messages at the routing layer to prevent route
    discovery, or target TCP acknowledgments in a TCP
    session to severely degrade the throughput.


                                                            6
   Relatively Easy to Actualize by Exploiting
    Knowledge of the Network Protocol and
    Cryptographic Primitives , extracted from
    Compromised nodes.

   Achieving strong security and prevention of
    Network performance Degradation.

   Jamming Attacks can be more easily Encountered
    and treated.



                                                     7
   Operating system :- Windows XP Professional

   Front End         :- JAVA, Swing(JFC),RMI

   Tool            :- Eclipse 3.3




                                                  8
   Processor   : Pentium IV 2.4 GHz.

   Hard Disk   : 40 GB.

   Monitor     : 15 VGA Colour.

   Ram         : 256 Mb.




                                        9
   We evaluated the impact of selective Jamming
    Attacks on network protocols such as TCP and
    Routing.

   Our findings show that a selective Jammer can
    significantly impact performance with very low
    effort.

   We develop three schemes that transform a
    selective jammer to a random one by preventing
    real-time packet classification , by combining
    cryptographic primitives with physical-layer
    attributes.

                                                     10
   Alejandro Proan`o and Loukas Lazos, “Packet
    Hiding Methods for Preventing selective Jamming
    Attacks” IEEE TRANSACTIONS ON DEPENDABLE AND
    SECURE COMPUTING,
   VOL.9,NO.1,JANUARY/FEBRUARY 2012.




                                                      11
12
4/2/2013

Contenu connexe

Tendances

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
Kunal Prajapati
 

Tendances (20)

Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
I030102056063
I030102056063I030102056063
I030102056063
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemula
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocols
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

En vedette

Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
Abdul Haseeb
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
Mahmoud Abdeen
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
Sameer Gupta
 
Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015
Jamie Ross
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
Conferencias FIST
 

En vedette (20)

Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Jamming in Wireless Sensor Networks
Jamming in Wireless Sensor NetworksJamming in Wireless Sensor Networks
Jamming in Wireless Sensor Networks
 
GNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationGNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and Mitigation
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Denver Alarm System
Denver Alarm SystemDenver Alarm System
Denver Alarm System
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
 
Anti GPS
Anti GPSAnti GPS
Anti GPS
 
114331707
114331707114331707
114331707
 
Drone Jammer
Drone JammerDrone Jammer
Drone Jammer
 
Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015Jamming Mitigation - Brochure 2015
Jamming Mitigation - Brochure 2015
 
Jammers&anti jammers
Jammers&anti jammersJammers&anti jammers
Jammers&anti jammers
 
AJAL JAMMING
AJAL JAMMINGAJAL JAMMING
AJAL JAMMING
 
Cryptanalysis of image encryption using traditional encryption tecnhniques
Cryptanalysis of image encryption using traditional encryption tecnhniquesCryptanalysis of image encryption using traditional encryption tecnhniques
Cryptanalysis of image encryption using traditional encryption tecnhniques
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
 

Similaire à Ppt

Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
IJRAT
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
BRNSSPublicationHubI
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
haq107457
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
ezoicxcom
 

Similaire à Ppt (20)

Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
G011123539
G011123539G011123539
G011123539
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Intrusion preventionintrusion detection
Intrusion preventionintrusion detectionIntrusion preventionintrusion detection
Intrusion preventionintrusion detection
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
D0961927
D0961927D0961927
D0961927
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 

Ppt

  • 1. Presented By : SYED FARAZ ALI MOHAMMED MOOSA KHAN KALYANSHETTY MOHD NAJEEB JANI Under The Guidance of: Prof .Rajshekhar Gaithond
  • 2. CONTENTS Introduction Aim Existing System Proposed System Advantages of Proposed System Software Specifications Hardware Specification Conclusion References 2
  • 3. The open nature of the wireless medium leaves it vulnerable to interference attacks, typically referred to as jamming.  This interference attacks can be used for performing Eavesdropping & Denial-of-Service attacks on wireless networks.  While eavesdropping can be prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize Denial-of-Service (DoS) attacks against wireless networks.  Typically, jamming has been addressed under an external threat model. in which the jammer is not part of the network. Under this model, the adversary interferes with the reception of messages by transmitting a continuous jamming signal.  In this Work, we address the problem of jamming under an internal threat model. We consider a sophisticated adversary who is aware of network secrets and the implementation details of network & exploits his knowledge for launching selective jamming attacks in which specific messages of “high importance” are targeted. 3
  • 4. To Show that Selective Jamming Attacks can be Launched By Performing Real-Time Packet Classification at Physical layer.  To Prevent these attacks develop schemes that prevent Real-Time packet classification by combining Cryptographic Primitives with Physical layers attributes. 4
  • 5. Jamming attacks are much harder to counter and has more security problems.  In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal , or several short jamming pulses.  jamming attacks have been considered under an external threat model, in which the jammer is not part of the network. Under this model, jamming strategies include the continuous or random transmission of highpower interference signals. 5
  • 6. In the proposed system, we address the problem of jamming under an internal threat model.  We consider a sophisticated adversary who is aware of network secrets and the implementation details of network protocols.  The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance” are targeted.  For example, a jammer can target route-request/route- reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput. 6
  • 7. Relatively Easy to Actualize by Exploiting Knowledge of the Network Protocol and Cryptographic Primitives , extracted from Compromised nodes.  Achieving strong security and prevention of Network performance Degradation.  Jamming Attacks can be more easily Encountered and treated. 7
  • 8. Operating system :- Windows XP Professional  Front End :- JAVA, Swing(JFC),RMI  Tool :- Eclipse 3.3 8
  • 9. Processor : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Monitor : 15 VGA Colour.  Ram : 256 Mb. 9
  • 10. We evaluated the impact of selective Jamming Attacks on network protocols such as TCP and Routing.  Our findings show that a selective Jammer can significantly impact performance with very low effort.  We develop three schemes that transform a selective jammer to a random one by preventing real-time packet classification , by combining cryptographic primitives with physical-layer attributes. 10
  • 11. Alejandro Proan`o and Loukas Lazos, “Packet Hiding Methods for Preventing selective Jamming Attacks” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,  VOL.9,NO.1,JANUARY/FEBRUARY 2012. 11