Advanced Internet Technologies

advertisement
PROJECTS
“In theory there is no difference between theory and
practice. In practice there is.”
- Yogi Berra
1
Assignment 2
NS2/GloMoSim/OMNeT++
Intrusion Detection in Mobile Ad-hoc
networks
 Secure Routing in Mobile Ad-hoc
networks
 Key Management considerations in
MANETs
The simulation must relate to some
security-related example.

2
Use of Simulators in MANET Research
Reference: S. Kurkowski, T. Camp, and M. Colagrosso, "MANET
Simulation Studies: The Incredibles", ACM SIGMOBILE Mobile
Computing and Communication Review, Vol. 9, Issue 4 October, 2005.
3
OMNeT++

2009: Bazara I.A. Barry,” Intrusion detection with
OMNeT++”, International Conference On Simulation Tools
And Techniques For Communications, Networks And Systems &
Workshops: Proceedings of the 2nd International Conference on
Simulation Tools and Techniques

2009: Thomas Gamer, Christoph P.Mayer,” Largescale evaluation of distributed attack detection”,
International Conference On Simulation Tools And Techniques
For Communications, Networks And Systems & Workshops:
Proceedings of the 2nd International Conference on Simulation
Tools and Techniques
4
GloMoSim

Latha Tamilselvan, V Sankaranarayanan,” Prevention of
Co-operative Black Hole Attack in MANET”, JOURNAL OF
NETWORKS, VOL. 3, NO. 5, MAY 2008
Reference:
https://academypublisher.com/~academz3/jnw/vol03/no05/jnw0305
1320.pdf as of Nov 8, 2009


Rehan Akbani, Turgay Korkmaz, and G.V.S. Raju,” HEAP: A packet
authentication scheme for mobile ad hoc networks“, Ad Hoc Networks
Volume 6, Issue 7, September 2008, Pages 1134-1150, SpringerVerlag
Reference:
http://www.sciencedirect.com/science?_ob=MImg&_imagekey=B757
6-4R53T1F-211&_cdi=12890&_user=1010624&_orig=search&_coverDate=09%2F
30%2F2008&_sk=999939992&view=c&wchp=dGLbVlWzSkzV&md5=1e2f634e8e19db3cef58970e9c9b8fe9&ie=/sdarticle.pdf
5
NS2

2009: Master’s Thesis :
Xiao Yang Zhang,” Detection of
the Black Hole Attack ia a MANET”, Master’s thesis 2009
supervised by Prof Yasushi Wakahara
Reference: http://repository.dl.itc.utokyo.ac.jp/dspace/bitstream/2261/25491/1/K-01871.pdf as of Nov
8, 2009

2009 Paper:
Payal N. Raj, Prashant B. Swadas,”
DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST
BLACKHOLE ATTACK IN AODV BASED MANET”, IJCSI
International Journal of Computer Science Issues, Vol. 2,
2009
Reference: http://arxiv.org/ftp/arxiv/papers/0909/0909.2371.pdf as of
Nov 8, 2009
6
NS 2

………2
2009: Master’s Thesis : Vital Mynampati, Dilip
Kandula, Raghuram Garimilla, Kalyan Srinivas,”
Performance and Security of Wireless Mesh
Networks”, Master’s Thesis June 2009,supervised by
Dr. Doru Constantinescu, at School of Computing,
Blekinge Institute of Technology, Sweden
Reference:
http://www.bth.se/fou/cuppsats.nsf/all/fe0f1f7f97531de5c12576
140063165d/$file/Thesis_on_WMNs.pdf as of Nov 8, 2009

2009: Master’s Thesis : Vivek, Kumar,” Simulation
and Comparison of AODV and DSR routing protocols
in MANETs”, Master’s thesis, supervised by Sumit
Miglani, Aug 2009
Reference:
http://dspace.thapar.edu:8080/dspace/bitstream/10266/845/1/F
7
inal+thesis.pdf
Comparison among Simulators
A comparison of J-Sim, OMNeT++, ns-2, and ShoX for
simulation of wireless networks:
Johannes Lessmann, Peter Janacik, Lazar Lachev,
Dalimir Orfanus,” Comparative Study of Wireless
Network Simulators”, Seventh International
Conference on Networking 2008 (available on IEEE
Explore)
Reference:
http://nsl10.csie.nctu.edu.tw/products/nctuns/NCTUnsReference
s/network2008.pdf
8
Comparison among Simulators
…….2
A comparison of OMNET++ with NS2:
Xiaodong Xian Weiren Shi He Huang,”
Comparison of OMNET++ and other
simulator for WSN simulation”, 3rd IEEE
Conference on Industrial Electronics
and Applications, 2008. ICIEA 2008
9
Project 2
Project 2 must use both wired and
wireless attacks.
Conceptually it may be similar to Project 1.

10
Surveys



Reliable Combination of ID Alerts:

Dempster-Shafer theory

Dezert-Smarandache Theory
Identity-based Encryption
Revocation of Certificates
11
Assignment 1 and Project 1

The project will be a practical measurement system,
set up for performing a security job of auditing, port
scanning, vulnerability testing, penetration, intrusion
detection or mounting an attack.
 The project would require multiple computer
systems. One computer may generate packets for
attacking/ penetration testing/ vulnerability testing of
another system. The other system may have an IDS
or some other system to be able to receive the
packets.
The project should use some wireless devices and
network.
Another possible project: a Man-in-the Middle attack
12
Assignment 1




Should describe the software tools
proposed to be used in Project 1.
Should show the network to be used for
the Project 1.
Should state clearly the measurement
to be made and the objectives of these
measurement.
Should state all the references,
including the web-sites and books.
13
Open Source Security product categories




Port Scanners
Vulnerability Scanners
Network Sniffers
Intrusion Detection Systems (IDSs)
References: 1. SNORT http://www.snort.org/
2. BRO http://bro-ids.org/
3. Top 5 IDSs: http://sectools.org/ids.html


Wireless Tools
Tools: Forensic/Analysis & Management/ Encryption
Reference: Top 100 Network Security Tools: http://sectools.org/index.html
14
Some Useful open source Products


KISMET:an 802.11 layer2 wireless network detector,
sniffer, and intrusion detection system. Kismet will
work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b,
802.11a, and 802.11g traffic.
NETSTUMBLER:NetStumbler is a tool for Windows
that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and
802.11g.

WIRESHARK:Wireshark is the world's foremost
network protocol analyzer
15
Another open-source product:
TrueCrypt: for Laptop Data Encryption



Multiple users can share access to encrypted data by
presenting keyfiles in addition to their passwords.
You can create any number of keyfiles using
TrueCrypt's random number generator.
TrueCrypt supports Windows Vista, XP, MacOSX and
Linux.
performance indicators: on a test system ranged
from a 64.7 MB/s encrypt/decrypt mean for AES
alone, to a 14.5 MB/s mean for AES-Twofish-Serpent,
so AES-Twofish gives reasonable balance.
16
Projects 1
Alessandro:
Dsniff, webspy, arpspoof: auditing and
penetration testing
 Faisal:
Colasoft packet builder and sender
 Farhan
Packet Injections using Nemesis and
Detecting Packets with Wireshark

17
Projects 1
continued 2
Jeffrey
NetCat and Ncat for port scanning, for allowing
a hacker to take control of a computer
remotely
 John Ouimet and Kyle Newman





packet sniffing on SSL/HTTPS connections. By
using Wireshark
look for vulnerabilities and
attempt a man in the middle attack.
Mohit: GPG
18
Download