1 / 10

Term project for CS492

Term project for CS492. Difference of Security Hazard in wired/wireless. 20020409 이찬희 20066057 장재혁. Table of Contents. Motivation Project goal and Scope Technical Problem Methodology Expected Results and Deliverable Progress. Motivation.

eugene
Télécharger la présentation

Term project for CS492

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Term project for CS492 Difference of Security Hazard in wired/wireless 20020409 이찬희 20066057 장재혁

  2. Table of Contents • Motivation • Project goal and Scope • Technical Problem • Methodology • Expected Results and Deliverable • Progress

  3. Motivation • Collecting Information of topic 1 may cause illegal activities. • To observe the current condition of security hazard by hand in KAIST seems to be interesting.

  4. Project goal and Scope 1. Goal • Actual numerical data of attacks in wired/wireless • Intruder’s different scanning techniques in wired/wireless Obtainable 2. Scope We can understand our current level of security hazard and difference of the level between wired and wireless through the data which will be got after measurement.

  5. Technical Problem • Which software are we going to use? (Nmap, Iplog, …) - Since each software can run only in specific OS. • Most of those software run on the linux, but we are not much familiar with that. • Wireless : Many possible places with different network settings - Those environments may effect the result -> Sol) Talk with other teams that have the same subject and Choose different place ( Sampling ) - Also notebook should be safe from being steeled.

  6. Methodology • Collecting data (By using specific software) • Wired : Computers in dorms/labs • Wireless : Pick places to experiment in school where our notebook will not be in stake. • Analyzing data • Learn to classify different type of attacks (research/study) • With the above knowledge, process the data • Compare the results of wired case and wireless case, and then conclude something.

  7. Expected Results and Deliverable • Since UDP is simple and using port number more significantly than TCP, The percentage of UDP port scanning may be high. • Studying the scanning techniques and then by classifying the data, we can know which type of attack is dominant in both wired and wireless part. • Also we can realize the week points of current protocols in wired/wireless.

  8. Progress(1) • 사용할 Software : iplog - 포트 scanning을 logging하는 툴. - http://ojnk.sourceforge.net/ - Linux, BSD 등에서 실행 가능. ( MS Window 버전은 없음. ) • TCP 포트, UDP 포트 scanning, TCP null 스캔, FIN 스캔,smurf 공격, Xmas 스캔, ping 플러딩, IP fragment 공격 등을 감지. • procmisc 모드를 지원하여 같은 subnet으로 들어오는 scanning 감지 및 OS 정보를 숨기기한 목적으로도 사용 가능.

  9. Progress ( 2 : Setup ) • 프로그램 수행 컴퓨터 - Wired : 조원 계정으로 접속한 전산동아리 Haje 의 Server Computer. - Wireless : 수업에서 제공한 LapTop. • Pre-required to install Iplog - 1) flex : fast lex, 스캐너(텍스트 패턴 인식기)를 작성하는 도구. - 2) libcap : POSIX 1e. 능력을 가져오고 설정하는데 사용되는 라이브러리. • 설치 방법 - (filename).tar.gz 을 받아 압축을 풀고 설치한다. (flex, libcap, iplog 순) # tar xvfz (filename).tar.gz# cd (filename)# ./configure# make# make install - iplog 설치 시만 부가적으로 iplog.conf에서 다음 2가지를 수정한다.user nobody# default는 iplog 사용자로 실행함pid-file /var/run/iplog.pid# default는 /var/run/iplog/iplog.pid 임

  10. Progress ( 3 : 프로그램 실행) • 현재 상황. • 설치 후 실행 시 Logfile 경로 설정의 문제로 에러 발생.

More Related