SlideShare a Scribd company logo
1 of 8
Constructing Inter-Domain Packet Filters to
Control IP
Spoofing Based on BGP Updates

(Synopsis)
Abstract
The Distributed Denial-of-Service (DDoS) attack is a serious
threat to the legitimate use of the Internet. Prevention mechanisms
are thwarted by the ability of attackers to forge or spoof the source
addresses in IP packets. By employing IP spoofing, attackers can
evade detection and put a substantial burden on the destination
network for policing attack packets. In this paper, we propose an interdomain packet filter (IDPF) architecture that can mitigate the level of
IP spoofing on the Internet. A key feature of our scheme is that it does
not require global routing information. IDPFs are constructed from the
information implicit in Border Gateway Protocol (BGP) route updates
and are deployed in network border routers. We establish the
conditions under which the IDPF framework correctly works in that it
does not discard packets with valid source addresses. Based on
extensive

simulation studies,

we show that,

even

with partial

deployment on the Internet, IDPFs can proactively limit the spoofing
capability of attackers. In addition, they can help localize the origin of
an attack packet to a small number of candidate networks.
Existing System:
•

Existing system uses Network Ingress Filtering.

•

Ingress filtering primarily prevents a specific network from being
used for attacking others.

Proposed System:
•

In our project we propose and study IDPF architecture as an
effective

countermeasure

to

the

IP

spoofing-based

DDoS

attacks. IDPFs rely on BGP update messages exchanged on the
Internet to infer the validity of source address of a packet
forwarded by a neighbor.
System Requirements
Hardware Requirements:
•

PROCESSOR

: PENTIUM IV 2.6 GHz

•

RAM

:512 MB DD RAM

•

MONITOR

:15” COLOR

•

HARD DISK

:20 GB

•

FLOPPY DRIVE

:1.44 MB

•

CDDRIVE

:LG 52X

•

KEYBOARD

:STANDARD 102 KEYS

Software Requirements:
•

FRONT END

: Java swing and Networking

•

OPERATING SYSTEM : Window’s XP

•

BACK END

:Ms Access
Modules:

 Check and lookup the local network
 Content Selection
 Encryption
 BGP
 Hackers
 Decryption

Check and lookup the local network
This is module which executes at the
loading time to check and lookup the local network. It gets all the
systems which are connected to that local network. This helps to the
gets current working nodes that means which are active and ready for
access in the network.
Content Selection
It uses a dialog box to open a required file format, but it
mainly supports only for the text support files. The file loaded to a file
variable, Then it send to the next stage Encryption area.
Encryption
In this the original data is converted to some other format
using chips algorithm so that incase some intruder may hack the file at
any reason or at any cost, but they won’t get the original data unless it
decrypted in proper format.
BGP
In this Modules BGP (Border Gateway Protocol) is a
protocol that communicates across the network and also monitoring
the client present in the network. It has all client details as a table.
The connection is established with the client and the Router. The
Encrypted data is transmitted to the Router which can send or redirect
to the correct destination address. The Router checks whether the
sender and receiver are proper to the network. Incase the sender
(hacker) is not a proper member in the network then that node is said
to the attacker node, then the message will not sent to the
destination. Otherwise the message will send to the destination
address.
Hackers
The hacker will act as a client in the distributed network.
The hacker may have false name in the network and virtually seems to
be present within the current network. It selects the destination
address which original present in the network.

Decryption
At the destination the received encrypted data will under
go decryption to get the original data which was sent by the sender.
Decryption using chips algorithm for the decryption of the received
data to the original content.

After decryption only the data will be

meaningful. The Encryption and Decryption gives the security to data
while transferring.
PROBLEM DEFINITION
The first and long-term recommendation is to adopt source IP
address verification, which confirms the importance of the IP spoofing
problem. IP spoofing will remain popular for a number of reasons.
First, IP spoofing makes isolating attack traffic from legitimate traffic
harder: packets with spoofed source addresses may appear to be from
all around the Internet. Second, it presents the attacker with an easy
way to insert a level of indirection. As a consequence, substantial
effort is required to localize the source of the attack traffic. Finally,
many popular attacks such as man-in-the-middle attacks, reflectorbased attacks, and attackers use IP spoofing and require the ability to
forge source addresses. Although attackers can insert arbitrary source
addresses into IP packets, they cannot control the actual paths that
the packets take to the destination.
Based on this observation, we have proposed the route-based
packet filters as a way of mitigating IP spoofing. The idea is that by
assuming single-path routing, there is exactly one single path between
the source node and the destination node. Hence, any packet with the
source address and the destination address that appear in a router
that is not in path source and destination address should be discarded.
The Internet consists of thousands of network domains or
autonomous systems (ASs). Each AS communicates with its neighbors
by using the Border Gateway Protocol (BGP), which is the de facto
inter-domain routing protocol, to exchange information about its own
networks and others that it can reach. BGP is a policy-based routing
protocol in that both the selection and the propagation of the best
route to a destination at an AS are guided by some locally defined
routing policies.

More Related Content

What's hot

An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymitylokijaja
 
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET-  	  Data Security in Network Flow using Obfuscation TechniqueIRJET-  	  Data Security in Network Flow using Obfuscation Technique
IRJET- Data Security in Network Flow using Obfuscation TechniqueIRJET Journal
 
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet InspectionWhitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspectionipoque
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
 
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection EngineDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection Engineijasuc
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesIOSR Journals
 

What's hot (18)

An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
 
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET-  	  Data Security in Network Flow using Obfuscation TechniqueIRJET-  	  Data Security in Network Flow using Obfuscation Technique
IRJET- Data Security in Network Flow using Obfuscation Technique
 
Whitepaper Deep Packet Inspection
Whitepaper Deep Packet InspectionWhitepaper Deep Packet Inspection
Whitepaper Deep Packet Inspection
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Pgp
PgpPgp
Pgp
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection EngineDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
Abstract
AbstractAbstract
Abstract
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
 

Similar to Controlling ip spoofing through inter domain packet filters(synopsis)

IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPREVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPpaperpublications3
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSadan Kumar
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffingBhavya Chawla
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityeSAT Journals
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijripublishers Ijri
 

Similar to Controlling ip spoofing through inter domain packet filters(synopsis) (20)

Presentation1
Presentation1Presentation1
Presentation1
 
D017131318
D017131318D017131318
D017131318
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
L45026571
L45026571L45026571
L45026571
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPREVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
 
CY.pptx
CY.pptxCY.pptx
CY.pptx
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhan
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Mcse question
Mcse questionMcse question
Mcse question
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network security
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 

More from Mumbai Academisc

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Controlling ip spoofing through inter domain packet filters(synopsis)

  • 1. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates (Synopsis)
  • 2. Abstract The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an interdomain packet filter (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information. IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. Based on extensive simulation studies, we show that, even with partial deployment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.
  • 3. Existing System: • Existing system uses Network Ingress Filtering. • Ingress filtering primarily prevents a specific network from being used for attacking others. Proposed System: • In our project we propose and study IDPF architecture as an effective countermeasure to the IP spoofing-based DDoS attacks. IDPFs rely on BGP update messages exchanged on the Internet to infer the validity of source address of a packet forwarded by a neighbor.
  • 4. System Requirements Hardware Requirements: • PROCESSOR : PENTIUM IV 2.6 GHz • RAM :512 MB DD RAM • MONITOR :15” COLOR • HARD DISK :20 GB • FLOPPY DRIVE :1.44 MB • CDDRIVE :LG 52X • KEYBOARD :STANDARD 102 KEYS Software Requirements: • FRONT END : Java swing and Networking • OPERATING SYSTEM : Window’s XP • BACK END :Ms Access
  • 5. Modules:  Check and lookup the local network  Content Selection  Encryption  BGP  Hackers  Decryption Check and lookup the local network This is module which executes at the loading time to check and lookup the local network. It gets all the systems which are connected to that local network. This helps to the gets current working nodes that means which are active and ready for access in the network. Content Selection It uses a dialog box to open a required file format, but it mainly supports only for the text support files. The file loaded to a file variable, Then it send to the next stage Encryption area. Encryption In this the original data is converted to some other format using chips algorithm so that incase some intruder may hack the file at any reason or at any cost, but they won’t get the original data unless it decrypted in proper format.
  • 6. BGP In this Modules BGP (Border Gateway Protocol) is a protocol that communicates across the network and also monitoring the client present in the network. It has all client details as a table. The connection is established with the client and the Router. The Encrypted data is transmitted to the Router which can send or redirect to the correct destination address. The Router checks whether the sender and receiver are proper to the network. Incase the sender (hacker) is not a proper member in the network then that node is said to the attacker node, then the message will not sent to the destination. Otherwise the message will send to the destination address. Hackers The hacker will act as a client in the distributed network. The hacker may have false name in the network and virtually seems to be present within the current network. It selects the destination address which original present in the network. Decryption At the destination the received encrypted data will under go decryption to get the original data which was sent by the sender. Decryption using chips algorithm for the decryption of the received data to the original content. After decryption only the data will be meaningful. The Encryption and Decryption gives the security to data while transferring.
  • 7. PROBLEM DEFINITION The first and long-term recommendation is to adopt source IP address verification, which confirms the importance of the IP spoofing problem. IP spoofing will remain popular for a number of reasons. First, IP spoofing makes isolating attack traffic from legitimate traffic harder: packets with spoofed source addresses may appear to be from all around the Internet. Second, it presents the attacker with an easy way to insert a level of indirection. As a consequence, substantial effort is required to localize the source of the attack traffic. Finally, many popular attacks such as man-in-the-middle attacks, reflectorbased attacks, and attackers use IP spoofing and require the ability to forge source addresses. Although attackers can insert arbitrary source addresses into IP packets, they cannot control the actual paths that the packets take to the destination. Based on this observation, we have proposed the route-based packet filters as a way of mitigating IP spoofing. The idea is that by assuming single-path routing, there is exactly one single path between the source node and the destination node. Hence, any packet with the source address and the destination address that appear in a router that is not in path source and destination address should be discarded. The Internet consists of thousands of network domains or autonomous systems (ASs). Each AS communicates with its neighbors by using the Border Gateway Protocol (BGP), which is the de facto inter-domain routing protocol, to exchange information about its own
  • 8. networks and others that it can reach. BGP is a policy-based routing protocol in that both the selection and the propagation of the best route to a destination at an AS are guided by some locally defined routing policies.