PROJECTS “In theory there is no difference between theory and practice. In practice there is.” - Yogi Berra 1 Assignment 2 NS2/GloMoSim/OMNeT++ Intrusion Detection in Mobile Ad-hoc networks Secure Routing in Mobile Ad-hoc networks Key Management considerations in MANETs The simulation must relate to some security-related example. 2 Use of Simulators in MANET Research Reference: S. Kurkowski, T. Camp, and M. Colagrosso, "MANET Simulation Studies: The Incredibles", ACM SIGMOBILE Mobile Computing and Communication Review, Vol. 9, Issue 4 October, 2005. 3 OMNeT++ 2009: Bazara I.A. Barry,” Intrusion detection with OMNeT++”, International Conference On Simulation Tools And Techniques For Communications, Networks And Systems & Workshops: Proceedings of the 2nd International Conference on Simulation Tools and Techniques 2009: Thomas Gamer, Christoph P.Mayer,” Largescale evaluation of distributed attack detection”, International Conference On Simulation Tools And Techniques For Communications, Networks And Systems & Workshops: Proceedings of the 2nd International Conference on Simulation Tools and Techniques 4 GloMoSim Latha Tamilselvan, V Sankaranarayanan,” Prevention of Co-operative Black Hole Attack in MANET”, JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008 Reference: https://academypublisher.com/~academz3/jnw/vol03/no05/jnw0305 1320.pdf as of Nov 8, 2009 Rehan Akbani, Turgay Korkmaz, and G.V.S. Raju,” HEAP: A packet authentication scheme for mobile ad hoc networks“, Ad Hoc Networks Volume 6, Issue 7, September 2008, Pages 1134-1150, SpringerVerlag Reference: http://www.sciencedirect.com/science?_ob=MImg&_imagekey=B757 6-4R53T1F-211&_cdi=12890&_user=1010624&_orig=search&_coverDate=09%2F 30%2F2008&_sk=999939992&view=c&wchp=dGLbVlWzSkzV&md5=1e2f634e8e19db3cef58970e9c9b8fe9&ie=/sdarticle.pdf 5 NS2 2009: Master’s Thesis : Xiao Yang Zhang,” Detection of the Black Hole Attack ia a MANET”, Master’s thesis 2009 supervised by Prof Yasushi Wakahara Reference: http://repository.dl.itc.utokyo.ac.jp/dspace/bitstream/2261/25491/1/K-01871.pdf as of Nov 8, 2009 2009 Paper: Payal N. Raj, Prashant B. Swadas,” DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 Reference: http://arxiv.org/ftp/arxiv/papers/0909/0909.2371.pdf as of Nov 8, 2009 6 NS 2 ………2 2009: Master’s Thesis : Vital Mynampati, Dilip Kandula, Raghuram Garimilla, Kalyan Srinivas,” Performance and Security of Wireless Mesh Networks”, Master’s Thesis June 2009,supervised by Dr. Doru Constantinescu, at School of Computing, Blekinge Institute of Technology, Sweden Reference: http://www.bth.se/fou/cuppsats.nsf/all/fe0f1f7f97531de5c12576 140063165d/$file/Thesis_on_WMNs.pdf as of Nov 8, 2009 2009: Master’s Thesis : Vivek, Kumar,” Simulation and Comparison of AODV and DSR routing protocols in MANETs”, Master’s thesis, supervised by Sumit Miglani, Aug 2009 Reference: http://dspace.thapar.edu:8080/dspace/bitstream/10266/845/1/F 7 inal+thesis.pdf Comparison among Simulators A comparison of J-Sim, OMNeT++, ns-2, and ShoX for simulation of wireless networks: Johannes Lessmann, Peter Janacik, Lazar Lachev, Dalimir Orfanus,” Comparative Study of Wireless Network Simulators”, Seventh International Conference on Networking 2008 (available on IEEE Explore) Reference: http://nsl10.csie.nctu.edu.tw/products/nctuns/NCTUnsReference s/network2008.pdf 8 Comparison among Simulators …….2 A comparison of OMNET++ with NS2: Xiaodong Xian Weiren Shi He Huang,” Comparison of OMNET++ and other simulator for WSN simulation”, 3rd IEEE Conference on Industrial Electronics and Applications, 2008. ICIEA 2008 9 Project 2 Project 2 must use both wired and wireless attacks. Conceptually it may be similar to Project 1. 10 Surveys Reliable Combination of ID Alerts: Dempster-Shafer theory Dezert-Smarandache Theory Identity-based Encryption Revocation of Certificates 11 Assignment 1 and Project 1 The project will be a practical measurement system, set up for performing a security job of auditing, port scanning, vulnerability testing, penetration, intrusion detection or mounting an attack. The project would require multiple computer systems. One computer may generate packets for attacking/ penetration testing/ vulnerability testing of another system. The other system may have an IDS or some other system to be able to receive the packets. The project should use some wireless devices and network. Another possible project: a Man-in-the Middle attack 12 Assignment 1 Should describe the software tools proposed to be used in Project 1. Should show the network to be used for the Project 1. Should state clearly the measurement to be made and the objectives of these measurement. Should state all the references, including the web-sites and books. 13 Open Source Security product categories Port Scanners Vulnerability Scanners Network Sniffers Intrusion Detection Systems (IDSs) References: 1. SNORT http://www.snort.org/ 2. BRO http://bro-ids.org/ 3. Top 5 IDSs: http://sectools.org/ids.html Wireless Tools Tools: Forensic/Analysis & Management/ Encryption Reference: Top 100 Network Security Tools: http://sectools.org/index.html 14 Some Useful open source Products KISMET:an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. NETSTUMBLER:NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. WIRESHARK:Wireshark is the world's foremost network protocol analyzer 15 Another open-source product: TrueCrypt: for Laptop Data Encryption Multiple users can share access to encrypted data by presenting keyfiles in addition to their passwords. You can create any number of keyfiles using TrueCrypt's random number generator. TrueCrypt supports Windows Vista, XP, MacOSX and Linux. performance indicators: on a test system ranged from a 64.7 MB/s encrypt/decrypt mean for AES alone, to a 14.5 MB/s mean for AES-Twofish-Serpent, so AES-Twofish gives reasonable balance. 16 Projects 1 Alessandro: Dsniff, webspy, arpspoof: auditing and penetration testing Faisal: Colasoft packet builder and sender Farhan Packet Injections using Nemesis and Detecting Packets with Wireshark 17 Projects 1 continued 2 Jeffrey NetCat and Ncat for port scanning, for allowing a hacker to take control of a computer remotely John Ouimet and Kyle Newman packet sniffing on SSL/HTTPS connections. By using Wireshark look for vulnerabilities and attempt a man in the middle attack. Mohit: GPG 18