SlideShare a Scribd company logo
AUTOMATED DETECTION OF
STEALTHY PORT SCANS
By
P.Shankar Murthy
K.Vamshi Krishna
Network is used as a medium in order to
exchange the data packets between the Server
and Clients.
  Systems are connected to network using
their PORTS , which are identified by their port
id.
  Each system which is connected to network
has its own IP address.(A single system can
have more than one IP address).
Port Scanning is done by the HACKERS
using some third party software in order to
interrupt the packet exchange.
  There are two general purposes of
attackers to conduct portscans.
   1.Primary
   2.Seconday
The primary purpose is to get the
information about the status of IP address of
the system.


  The secondary purpose is to flood Intrusion
detection alerts with the intention of
distracting the network.
In the current system by using third party
network monitoring software the hackers can able
to share the resources o the network.
 They can display the all the host names(IP
addresses) which are in network and can interact
with any of the system as by pretending as
original clients.
In proposed system the administrator can control
the network , so that hackers are not able to share
all the resources.
 The admin has the right to control the resources
by providing limited access.
 So the clients in the network should utilize the
limited resources granted by the admin.
 In the current system the hackers want to connect
any system in the network the system can display
the prompting for authentication.
Admin
User
Admin
   Network
   Manipulation
   Resource

User
ADMIN CONTROLLING THE NETWORK..
Network
      In this module we will design a page with
             a. Username
             b. Password
             c. Access Type
   Manipulation
      In this module we have three other sub-modules.
              a. Protection
              b. Connection
              c. Find Network
   Resources
      In this module we have two sub-modules
              a. Displaying all resources
              b. Hiding unrequired resources
   Ram          :512 Mb DRAM
   Hard Disk   :20 Gb
FrontEnd         :C#.Net
Operating System :Windows-XP
QUERIES…
Automated detection of stealthy port scans.ppt(mine)

More Related Content

Viewers also liked

Higher education marketing – AMBA 2013
Higher education marketing – AMBA 2013Higher education marketing – AMBA 2013
Higher education marketing – AMBA 2013
Bradley Godolphin
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Shankar Murthy
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3Shankar Murthy
 
Grade v presentation lesson.-final
Grade v presentation lesson.-finalGrade v presentation lesson.-final
Grade v presentation lesson.-finalJenjen Kinakin
 
Earthquake prediction
Earthquake predictionEarthquake prediction
Earthquake prediction
Shankar Murthy
 
Earthquake prediction preview 1
Earthquake prediction preview 1Earthquake prediction preview 1
Earthquake prediction preview 1Shankar Murthy
 
đường lối chương 2
đường lối chương 2đường lối chương 2
đường lối chương 2Châu Bá Thông
 

Viewers also liked (11)

Higher education marketing – AMBA 2013
Higher education marketing – AMBA 2013Higher education marketing – AMBA 2013
Higher education marketing – AMBA 2013
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3
 
Hillside One Memories
Hillside One MemoriesHillside One Memories
Hillside One Memories
 
2000's
2000's2000's
2000's
 
Grade v presentation lesson.-final
Grade v presentation lesson.-finalGrade v presentation lesson.-final
Grade v presentation lesson.-final
 
Earthquake prediction
Earthquake predictionEarthquake prediction
Earthquake prediction
 
Earthquake prediction preview 1
Earthquake prediction preview 1Earthquake prediction preview 1
Earthquake prediction preview 1
 
đường lối chương 2
đường lối chương 2đường lối chương 2
đường lối chương 2
 
W3 analyzer.ppt
W3 analyzer.pptW3 analyzer.ppt
W3 analyzer.ppt
 
Steganography
SteganographySteganography
Steganography
 

Similar to Automated detection of stealthy port scans.ppt(mine)

Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
Vijayanand Yadla
 
Inter Process Communication PPT
Inter Process Communication PPTInter Process Communication PPT
Inter Process Communication PPT
Sowmya Jyothi
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideErica StJohn
 
Unit-3 frame generation (2).pptx
Unit-3 frame generation (2).pptxUnit-3 frame generation (2).pptx
Unit-3 frame generation (2).pptx
swethabollam11
 
IJET-V3I2P3
IJET-V3I2P3IJET-V3I2P3
Seminar
SeminarSeminar
6
66
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
Bhavya Chawla
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)Rushdi Shams
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
IJERA Editor
 
Detection of Self-Disciplinary Worms
Detection of Self-Disciplinary WormsDetection of Self-Disciplinary Worms
Detection of Self-Disciplinary Worms
Krishna Chaitanya Yarlagadda
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
RamkumardevendiranDe
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
Dhruvdoshi25071999
 
Distributed computing bsics
Distributed computing bsicsDistributed computing bsics
Distributed computing bsics
Deepak John
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
Jenny Richardson
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
ijsrd.com
 

Similar to Automated detection of stealthy port scans.ppt(mine) (20)

Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Inter Process Communication PPT
Inter Process Communication PPTInter Process Communication PPT
Inter Process Communication PPT
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
 
Unit-3 frame generation (2).pptx
Unit-3 frame generation (2).pptxUnit-3 frame generation (2).pptx
Unit-3 frame generation (2).pptx
 
M0704071074
M0704071074M0704071074
M0704071074
 
IJET-V3I2P3
IJET-V3I2P3IJET-V3I2P3
IJET-V3I2P3
 
Seminar
SeminarSeminar
Seminar
 
6
66
6
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
Detection of Self-Disciplinary Worms
Detection of Self-Disciplinary WormsDetection of Self-Disciplinary Worms
Detection of Self-Disciplinary Worms
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
 
Distributed computing bsics
Distributed computing bsicsDistributed computing bsics
Distributed computing bsics
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Automated detection of stealthy port scans.ppt(mine)

  • 1. AUTOMATED DETECTION OF STEALTHY PORT SCANS By P.Shankar Murthy K.Vamshi Krishna
  • 2. Network is used as a medium in order to exchange the data packets between the Server and Clients. Systems are connected to network using their PORTS , which are identified by their port id. Each system which is connected to network has its own IP address.(A single system can have more than one IP address).
  • 3.
  • 4. Port Scanning is done by the HACKERS using some third party software in order to interrupt the packet exchange. There are two general purposes of attackers to conduct portscans. 1.Primary 2.Seconday
  • 5. The primary purpose is to get the information about the status of IP address of the system. The secondary purpose is to flood Intrusion detection alerts with the intention of distracting the network.
  • 6.
  • 7.
  • 8. In the current system by using third party network monitoring software the hackers can able to share the resources o the network. They can display the all the host names(IP addresses) which are in network and can interact with any of the system as by pretending as original clients.
  • 9.
  • 10. In proposed system the administrator can control the network , so that hackers are not able to share all the resources. The admin has the right to control the resources by providing limited access. So the clients in the network should utilize the limited resources granted by the admin. In the current system the hackers want to connect any system in the network the system can display the prompting for authentication.
  • 12. Admin  Network  Manipulation  Resource User
  • 14. Network In this module we will design a page with a. Username b. Password c. Access Type  Manipulation In this module we have three other sub-modules. a. Protection b. Connection c. Find Network  Resources In this module we have two sub-modules a. Displaying all resources b. Hiding unrequired resources
  • 15. Ram :512 Mb DRAM  Hard Disk :20 Gb
  • 16. FrontEnd :C#.Net Operating System :Windows-XP