100 likes | 115 Vues
Security attacks in wired/wireless network. Team 6 이창현 , 박정아. Contents. Motivation Project goal and Scope Methodology Technical problems Expected results and Deliverable. 1. Motivation.
E N D
Security attacks in wired/wireless network Team 6 이창현, 박정아
Contents • Motivation • Project goal and Scope • Methodology • Technical problems • Expected results and Deliverable
1. Motivation • We use firewall and other programs to protect our computers from worm attacks, but do we actually know how serious it is? • Do the security attacks show different behavior in wired/wireless network?
2. Project goal and scope • To compare the patterns of security attacks in wired/wireless environments - Total number of security attacks - Percentage of each type (TCP, UDP, ICMP scanning, etc.) - Attack distribution over time • To find possible solutions to the problem
3. Methodology (1) • Choose several locations that provide both wired/wireless connections - CS building, Library, Creative learning building, etc. • Using two laptops at the same time, monitor the network traffic for one day to see which ports are scanned by attackers
3. Methodology (2) • From the log files, classify the type of security attacks and compare the results from wired/wireless network • Provide possible solutions to prevent those security attacks
4. Technical problems • Problem with location for experiment • Choosing a monitoring application to analyze log files easily
5. Expected result and deliverable • Security attacks might be prevalent in wired environment • Types of security attacks will be similar in both environment • The number of attacks in wired environment will be significantly reduced at night • Log files, analysis, project report