Preventing Denial of Service Attacks - PowerPoint PPT Presentation

ceana
preventing denial of service attacks n.
Skip this Video
Loading SlideShow in 5 Seconds..
Preventing Denial of Service Attacks PowerPoint Presentation
Download Presentation
Preventing Denial of Service Attacks

play fullscreen
1 / 76
Download Presentation
Preventing Denial of Service Attacks
143 Views
Download Presentation

Preventing Denial of Service Attacks

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Preventing Denial of Service Attacks by N.V.KrishnaRao (08034D0501) Under Supervision and Guidance of Dr. S.DurgaBhavaniS.V.S.HanumanthaRao (Internal Guide) (External Guide)

  2. ABSTRACT(MDAF Scheme): This Project proposes a scheme for detecting and preventing the most harmful and difficult to detect DoS Attacks those that use IP address spoofing to disguise the attack flow. The scheme allows the system to configure itself based on the normal traffic of a Web server, so that the occurrence of an attack can be quickly and precisely detected. The MDAF scheme scans the marking field of all incoming packets to selectively filter-out the attack packets. On employing this marking scheme, when a packet arrives at its destination, its marking depends only on the path it has traversed. If the source IP address of a packet is spoofed, this packet must have a marking that is different from that of a genuine packet coming from the same address. The spoofed packets can thus be easily identified and dropped by the filter, while the legitimate packets containing the correct markings are accepted.

  3. Existing System: Approaches for Defending DoS Attacks Preventive Source Tracking Reactive Defense Solutions Proactive Server - Packet Marking Schemes Path Identifier scheme (Pi) Roaming Scheme Probabilistic Packet Marking(PPM) Pushback method Deterministic Marking Approach(DPM) D-WARD Message Traceback Method Packet Score Logging Neighbor Stranger- Traffic Observation Method Discrimination (NSD)

  4. Proposed System: • Distinguishing the Attack Packets • Learning Phase • Filtering Phase • Marking Verification • Attack Detection • Complete Filtering Scheme • Route Change Consideration • Pushback Implementation

  5. Distinguishing the Attack Packets • Marking Scheme: Marking algorithm: k <- a 16-bit random number, secretly maintained by the Router M(R) <- k XOR h(A) For each packet w { If W.ID = 0 Then w.ID <- M(R) Else { M_old <- w.ID M_new <- M(R) XOR SL(M_old) w.ID <- M_new } }

  6. Learning Phase The (IP-address, Marking) pairs are stored in a Filter Table, which are later used to verify each incoming packet and filter-out the spoofed ones. • Filtering Phase To the packet from an IP address recorded in the Filter Table, it is accepted if it has a consistent marking otherwise, it is dropped . For the packet from a new IP address, scheme accept it with probability p and put the (IP-address, Marking) pair to a Check List, so that the marking can be verified. • Marking Verification If there is a consistent marking from unknown IP address till the threshold value then the (IP-address, Marking) from check table is moved to Filter table. • Attack Detection A counter known as TMC is maintained by server, it is incremented each time packets with incorrect markings as well as packets from unknown source addresses that are not recorded if counter reaches the threshold value then attack is signaled.

  7. Complete Filtering Scheme: • If the (IP-address, Marking) pair is same with one of the records in the Filter Table, the packet is received. • 2) If the source IP address of the packet exists in theFilter Table, but the marking does not match, this packet is considered to be a spoofed packet and is dropped. TMC is incremented. • 3) If the source IP address does not appear in the Filter Table, then this packet is accepted with a probability p. TMC is incremented. • 4) If the TMC value exceeds the threshold, an attack is signaled. • 5) All echo reply messages that are received as responses to the firewall’s requests are handled by the Check List verification process. They are not passed through the filter.

  8. Pushback Implementation In the Pushback method, the victim of a DoSattack sends the signatures of attack to upstream routers and ask them to help filtering out these packets. • Route Change Consideration SMC, to count the number of mismatching packets for any IP address A. When the value of SMCA reaches a threshold value, the entry (A, MarkingA) is copied to the Check List to test whether the route from this source has changed.

  9. Software Requirements: WINDOWS/LINUX OS J2SE 5.0 MS ACCESS • Hardware requirements: Intel Pentium based Micro-Processor with a minimum speed of • 500MHz or higher Ram memory of 256MB or higher Network Interface Card(NIC)

  10. Use Case diagram

  11. Class Diagram

  12. Sequential diagram

  13. collaboration

  14. Scheme Topology for packet flow Scheme Topology for packet flow in Route change consideration.

  15. The Results of This Project is illustrated with Screens using following tasks. 1. In Learning Phase adding the new client1 to the marking table 2. Authentication of user packets. 3. In Filtering phase handling the new client2 with verification process using check table. 4. Preventing the Attacker performing Spoofed attack with the client2’s ip address. 5. Preventing the Attacker performing Randomized attack. 6. Preventing the Attacker performing Flood attack. 7. Illustrating the attack signal and processing only legitimate user packets. 8. Showing the decrease in probability of acceptance of packets from new IP address. 9. Route change considerations of Client1 using smc table and path marking.

  16. Learning Phase: Client 1 sending packet.

  17. Learning Phase: Client1 window showing the Data transmission from Client1 to router1.

  18. Learning Phase: Router1 window showing the marking value and the details of Data Transmission to Router6.

  19. Learning Phase: Router6 window showing the marking value and the details of Data Transmission to server

  20. Learning Phase: Server window showing the packet acceptance details, packet details and authentication.

  21. Learning Phase: Client 1 window showing input data and the server response message with the authentication message.

  22. Learning Phase: Mark table reflecting the addition of Client 1 IPaddress and marking

  23. Learning Phase: Login table showing the Client 1 authentication details

  24. Learning Phase: Client 1 window showing the sending multiple packets and its authentication responses

  25. Learning Phase: Server window showing the spoofed details, packet details and authentication details.

  26. Filtering Phase: Client2 window showing sending a packet.

  27. Filtering Phase: Client2 window showing echo message responses and adding of record to mark & login tables after the verification process in filtering phase.

  28. Server window showing the Client 2 packet details, adding to Checklist and sending the echo packets in verification process in filtering phase.

  29. Filtering Phase: Server window showing the Client 2 packet details, echo packets and adding record to Mark table and login table after verification process

  30. Check table with the Client 2 path marking in Filtering Phase – verification process

  31. Mark table reflecting the addition of Client 2 path marking in filtering phase.

  32. Attacker window showing the Spoofing the Client2’s IP address and sending data packets (Spoofed Attack).

  33. Router6 window showing the details of sending the spoofed data packet to Server and showing the marking value (37992) which is different from the actual value (41184).

  34. Server window showing the spoofed details which has the different marking value than the actual marking value stored in the mark table for the IP address and packet details .

  35. Attacker window performing the Randomized Attack.

  36. Server window showing packet details in Filtering phase - verification process, the IP address accepted and stored in checklist for the verification.

  37. Server window showing the deletion of the record from Check list

  38. Mark table showing the Fake IP address with special symbol (null) so that it can filter all the packets coming from IP address

  39. Attacker window performing the Flood Attack.

  40. Mark table showing the Fake IP address with special symbol (null) so that it can filter all the packets coming from IP address.

  41. Attacker window showing the flood packets transmission

  42. Server window showing the Attack Signal

  43. Server window showing Push back method implementation

  44. Router6 implementing the packet filtration after push back method implementation.

  45. Client2 (legitimate user) window showing data packets authentication and acceptance of the packet after pushback method implementation

  46. Router6 Forwarding only the legitimate user packers after push back implementation.

  47. Server window showing the processing only legitimate user packets after push back method implementation.

  48. Attacker performing Randomized attack

  49. Router6 Forwarding only legitimate user packers and filtering the fake IP address packets.

  50. Server window showing the processing only legitimate user packets after push back method implementation.