1 / 9

Security attacks in wired/wireless network

Security attacks in wired/wireless network. Team 6 이창현 , 박정아. Contents. Motivation Project goal and Scope Methodology Technical problems Expected results and Deliverable. 1. Motivation.

willad
Télécharger la présentation

Security attacks in wired/wireless network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security attacks in wired/wireless network Team 6 이창현, 박정아

  2. Contents • Motivation • Project goal and Scope • Methodology • Technical problems • Expected results and Deliverable

  3. 1. Motivation • We use firewall and other programs to protect our computers from worm attacks, but do we actually know how serious it is? • Do the security attacks show different behavior in wired/wireless network?

  4. 2. Project goal and scope • To compare the patterns of security attacks in wired/wireless environments - Total number of security attacks - Percentage of each type (TCP, UDP, ICMP scanning, etc.) - Attack distribution over time • To find possible solutions to the problem

  5. 3. Methodology (1) • Choose several locations that provide both wired/wireless connections - CS building, Library, Creative learning building, etc. • Using two laptops at the same time, monitor the network traffic for one day to see which ports are scanned by attackers

  6. 3. Methodology (2) • From the log files, classify the type of security attacks and compare the results from wired/wireless network • Provide possible solutions to prevent those security attacks

  7. 4. Technical problems • Problem with location for experiment • Choosing a monitoring application to analyze log files easily

  8. 5. Expected result and deliverable • Security attacks might be prevalent in wired environment • Types of security attacks will be similar in both environment • The number of attacks in wired environment will be significantly reduced at night • Log files, analysis, project report

  9. The End

More Related