SlideShare a Scribd company logo
Router Simulation System for
mitigating Network Security
attacks
Rohan Choudhari
BE(IT)
AEC,Beed
Background for This Project?
Basics of InfoSec
Confidentiality Integrity Availability
Prevents
Unauthorized
use or disclosure
of information
Safeguards the
accuracy and
Completeness
of information
Authorized users
have reliable
And timely access
to the resources
Why Security ?
 The internet was initially designed for connectivity
(ARPANET).
 Trust Assumed
 We do more with the internet nowadays
 Security protocols are added on the top of TCP/IP
 Fundamental aspects of information must be protected .
 Confidential data
 Employee information
 Business models
 Protect identity and resources
 We can’t keep ourselves isolated from the internet
 Most business communications are done online
 We provide online services
 We get services from 3rd party organizations
Attacks on different layers
Layer 7: DNS ,DHCP,HTTP,FTP,IMAP,LDAP,NTP,SSH,
SMTP, SMNP, Telnet,TFTP
Layer 5 :SMB, NFS,Socks
Layer 3 :IPv4,IPv6,ICMP
Layer 2 :PPTP , Token Ring
DNS poisoning,
phishing,
SQL injection
TCP Attack , Routing
attack, SYN flooding,
Sniffing
Ping ,ICMP ,Flood
ARP Spoofing ,MAC
Flooding
TCP Attacks
Exploits the TCP 3 way handshake
Attacker sends a series of SYN packets
without replying the ACK packet
Finite queue size for incomplete
connections
SYN
ACK
SYN+ACK
SERVER
TCP Attacks
Exploits the TCP 3 way handshake
Attacker sends a series of SYN packets
without replying the ACK packet
Finite queue size for incomplete
connections
SYN
SYN+ACK
SERVER
(victim)ACK ?
DNS cache poisoning
client
I want to access
www.example.com
DNS
catching
server
1
2
QID =64571
Root /GTLD
ns.example.comwebServer
192.168.1.1
3
3
www.example.com
192.168.1.1
QID =64571
QID=64569
QID=64570
QID=64571 Match !
(Pretending to be
Authoritative zone)
www.example.com
192.168.1.99
Common Types of attacks
Reconnaissance-ping sweeps and port scans
Sniffing –capture packet as they travel through the network
Man-in–the-middle-attack: intercepts messages that are intended for
a valid device.
Spoofing –sets up a fake device and trick others to send messages
to it.
Hijacking- taking control of session
Denial of service (DoS) Dynamic DoS (DDoS)attack
Trusted Network
Standard defensive-oriented technologies
 Firewall-first line of defense
 Intrusion Detection
 Build TRUST on top of the TCP/IP Infrastructure
 Strong authentication
 Two factor authentication
 Something you have + something you know
 Public key infrastructure (PKI)
Access control
Access control –
ability to permit or deny the use of an object by a subject
It provide 3 essential services (known as
AAA)-
 Authentication-(who can login)
 Authorization - (what authorized users can do )
 Accountability –(identifies what a user did )
Important Steps to Security
• Password Protection
• Protecting the network by filtering Network Access and Traffic (i.e. Firewall)
• Running Security Audits
• Examine and monitor log files
• Use commonense: avoid dumpster divers and social engineers
Firewalls
A firewall is a computer, hardware, or even a piece of software that sits between
your network and the Internet, the firewall attempts to regulate and control the flow
of information preventing an array of potential attacks.
 A router utilizing Network Address Translation(NAT)
 Software firewalls such as Zone Alarm, Kerio Firewall,
Outpost, etc.
 Hardware firewalls such as Sonic’s SOHO firewall.
 Operating system firewalls Ex.Window XP’s built in filtering .
Virtual Private Network
Creates a secure tunnel over a public network
 Client-to-firewall , router-to-router , firewall-to-
firewall
VPN protocol standards:
 PPTP-(Point-to-Point Tunneling protocol)
 L2F -(Layer to Forwarding Protocol)
 L2TP-(Layer to tunneling Protocol)
 IPSec(Internet Protocol Security)
Significance of this project
It makes your computer a router !
 And a Gateway router too!!
Benefits:
 Test new configurations
New routing policies
New protocols
 Don’t disturb the production network
 Use cheap PCs instead of expensive routers.
Screenshots of project
Choosing simulation Environment
Output screen showing proposed network
infrastructure in a simulated environment
Mesh Topology
Bus Topology Simulation
Choosing various routing algorithms for
simulaion
Simulating Source Routing Algorithm
Finding Algorithmic Efficiancy
Magic Starts Here …
conclusion
The Simulator takes the configurations of
the subnet as Input and gives the different
statistics of the routers and links. By
changing the routing algorithms and the
different network configurations and
recording the results we obtain the optimal
algorithm. The optimal algorithm for a
particular network is obtained by analyzing
the results obtained. Simulation helps to
achieve an optimal path that reduces the
cost of routing and helps to maintain
network efficiency very easily.
Conclusion And Future Scope
The smaller networks can be analyzed and the
results can be employed in larger networks to
make routing efficient and economic. As the
Simulator has provision for the crashing of
routers, it gives an idea of which path is followed
when a crash occurs. It can be employed in real
networks to increase the performance of routers
and links. As it not feasible in real networks to
test algorithms and then implement a best one,
Routing Simulation System can be helpful in
maintaining Network Security. Hence it is
useful for people who provide networking
services and those who design networks.
Thank You !
Rohan Choudhari
BE(IT)
AEC,Beed

More Related Content

What's hot

Firewalls
FirewallsFirewalls
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
Fredrick Hall
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
Soban Ahmad
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10koolkampus
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
Arun Mahajan
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
yousef emami
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Firewall
FirewallFirewall
Firewall
Mudasser Afzal
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
vinayh.vaghamshi _
 

What's hot (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Firewall
FirewallFirewall
Firewall
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Firewall notes
Firewall notesFirewall notes
Firewall notes
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Dmz
Dmz Dmz
Dmz
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall
FirewallFirewall
Firewall
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 

Similar to network security / information security

Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
InnoTech
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
NetworkCollaborators
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
Jessica Thompson
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
 
Day4
Day4Day4
Day4
Jai4uk
 
Network security
Network securityNetwork security
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
RAVI RAJ
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
JAZEEL K T
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
mitali.ray
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Network security
Network securityNetwork security
Network security
Fekadu Abera
 

Similar to network security / information security (20)

Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
Day4
Day4Day4
Day4
 
Network security
Network securityNetwork security
Network security
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Network security
Network securityNetwork security
Network security
 

More from Rohan Choudhari

Network monitoring system for high availability infrastructure
Network monitoring system for high availability infrastructureNetwork monitoring system for high availability infrastructure
Network monitoring system for high availability infrastructure
Rohan Choudhari
 
Spirometry
SpirometrySpirometry
Spirometry
Rohan Choudhari
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
Rohan Choudhari
 
Water pollution
Water pollutionWater pollution
Water pollution
Rohan Choudhari
 

More from Rohan Choudhari (6)

Network monitoring system for high availability infrastructure
Network monitoring system for high availability infrastructureNetwork monitoring system for high availability infrastructure
Network monitoring system for high availability infrastructure
 
Spirometry
SpirometrySpirometry
Spirometry
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Ecg
EcgEcg
Ecg
 
Swine flu ppt
Swine flu pptSwine flu ppt
Swine flu ppt
 
Water pollution
Water pollutionWater pollution
Water pollution
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

network security / information security

  • 1. Router Simulation System for mitigating Network Security attacks Rohan Choudhari BE(IT) AEC,Beed
  • 3. Basics of InfoSec Confidentiality Integrity Availability Prevents Unauthorized use or disclosure of information Safeguards the accuracy and Completeness of information Authorized users have reliable And timely access to the resources
  • 4. Why Security ?  The internet was initially designed for connectivity (ARPANET).  Trust Assumed  We do more with the internet nowadays  Security protocols are added on the top of TCP/IP  Fundamental aspects of information must be protected .  Confidential data  Employee information  Business models  Protect identity and resources  We can’t keep ourselves isolated from the internet  Most business communications are done online  We provide online services  We get services from 3rd party organizations
  • 5. Attacks on different layers Layer 7: DNS ,DHCP,HTTP,FTP,IMAP,LDAP,NTP,SSH, SMTP, SMNP, Telnet,TFTP Layer 5 :SMB, NFS,Socks Layer 3 :IPv4,IPv6,ICMP Layer 2 :PPTP , Token Ring DNS poisoning, phishing, SQL injection TCP Attack , Routing attack, SYN flooding, Sniffing Ping ,ICMP ,Flood ARP Spoofing ,MAC Flooding
  • 6. TCP Attacks Exploits the TCP 3 way handshake Attacker sends a series of SYN packets without replying the ACK packet Finite queue size for incomplete connections SYN ACK SYN+ACK SERVER
  • 7. TCP Attacks Exploits the TCP 3 way handshake Attacker sends a series of SYN packets without replying the ACK packet Finite queue size for incomplete connections SYN SYN+ACK SERVER (victim)ACK ?
  • 8. DNS cache poisoning client I want to access www.example.com DNS catching server 1 2 QID =64571 Root /GTLD ns.example.comwebServer 192.168.1.1 3 3 www.example.com 192.168.1.1 QID =64571 QID=64569 QID=64570 QID=64571 Match ! (Pretending to be Authoritative zone) www.example.com 192.168.1.99
  • 9. Common Types of attacks Reconnaissance-ping sweeps and port scans Sniffing –capture packet as they travel through the network Man-in–the-middle-attack: intercepts messages that are intended for a valid device. Spoofing –sets up a fake device and trick others to send messages to it. Hijacking- taking control of session Denial of service (DoS) Dynamic DoS (DDoS)attack
  • 10. Trusted Network Standard defensive-oriented technologies  Firewall-first line of defense  Intrusion Detection  Build TRUST on top of the TCP/IP Infrastructure  Strong authentication  Two factor authentication  Something you have + something you know  Public key infrastructure (PKI)
  • 11. Access control Access control – ability to permit or deny the use of an object by a subject It provide 3 essential services (known as AAA)-  Authentication-(who can login)  Authorization - (what authorized users can do )  Accountability –(identifies what a user did )
  • 12. Important Steps to Security • Password Protection • Protecting the network by filtering Network Access and Traffic (i.e. Firewall) • Running Security Audits • Examine and monitor log files • Use commonense: avoid dumpster divers and social engineers
  • 13. Firewalls A firewall is a computer, hardware, or even a piece of software that sits between your network and the Internet, the firewall attempts to regulate and control the flow of information preventing an array of potential attacks.  A router utilizing Network Address Translation(NAT)  Software firewalls such as Zone Alarm, Kerio Firewall, Outpost, etc.  Hardware firewalls such as Sonic’s SOHO firewall.  Operating system firewalls Ex.Window XP’s built in filtering .
  • 14. Virtual Private Network Creates a secure tunnel over a public network  Client-to-firewall , router-to-router , firewall-to- firewall VPN protocol standards:  PPTP-(Point-to-Point Tunneling protocol)  L2F -(Layer to Forwarding Protocol)  L2TP-(Layer to tunneling Protocol)  IPSec(Internet Protocol Security)
  • 15.
  • 16. Significance of this project It makes your computer a router !  And a Gateway router too!! Benefits:  Test new configurations New routing policies New protocols  Don’t disturb the production network  Use cheap PCs instead of expensive routers.
  • 19. Output screen showing proposed network infrastructure in a simulated environment
  • 22.
  • 23. Choosing various routing algorithms for simulaion
  • 27.
  • 28.
  • 29. conclusion The Simulator takes the configurations of the subnet as Input and gives the different statistics of the routers and links. By changing the routing algorithms and the different network configurations and recording the results we obtain the optimal algorithm. The optimal algorithm for a particular network is obtained by analyzing the results obtained. Simulation helps to achieve an optimal path that reduces the cost of routing and helps to maintain network efficiency very easily.
  • 30. Conclusion And Future Scope The smaller networks can be analyzed and the results can be employed in larger networks to make routing efficient and economic. As the Simulator has provision for the crashing of routers, it gives an idea of which path is followed when a crash occurs. It can be employed in real networks to increase the performance of routers and links. As it not feasible in real networks to test algorithms and then implement a best one, Routing Simulation System can be helpful in maintaining Network Security. Hence it is useful for people who provide networking services and those who design networks.
  • 31. Thank You ! Rohan Choudhari BE(IT) AEC,Beed