Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

MITIGATING MIMICKING ATTACKS and ANTI ATTACKS

IN
CYBERSPACE NETWORKS
A PROJECT REPORT

Submitted by

V.GAYATHRI(510212104004)
J.MANIMEGALAI (510212104011)
N.SUGANTHI(510212104702)
In partial fulfilment for the award of the degree

Of

BACHELOR OF ENGINEERING
In

COMPUTER SCIENCE AND ENGINEERING

ANNAMALAIAR COLLEGE OF ENGINEERING

ANNA UNIVERSITY: CHENNAI 600 025

APRIL 2016
ANNA UNIVERSITY : CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report “PRIVACY POLICY FOR


IMAGES ON CONTENT SHARING SITES”is the bonafidework of

“V.GAYATHRI(510212104004),J.MANIMEGALAI(510212104011,
and N.SUGANTHI(510212104702)”who carried out the project work
under my supervision.

SIGNATURE SIGNATURE
Ms C.K.REVATHI, M.Tech, Ms C.K.REVATHI,M.Tech,,

HEAD OF THE DEPARTMENT SUPERVISOR

Assistant Professor
Department of Computer Science and Department of Computer Science and
Engineering Engineering
Annamalaiar College of Engineering Annamalaiar College of Engineering
Modaiyur-606 902 Modaiyur-606 902

Submitted to the VIVA VOCE held on…………………..

INTERNAL EXAMINER EXTERNAL EXAMINER


ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of any work would
be incomplete without mentioning those people who made it possible, whose
constant guidance and encouragement rounded our efforts with success.

It is a great pleasure for us to acknowledge the assistance and contributions of


some people for this effort. First, we would like to thank god for giving us the
confidence and power to complete this work successfully. We would like to
thank CHAIRMANDr.K.R.ARUMUGAM, BE. F.I.E., D.Litt.
M.I.S.T.E., MA (YOGA) Founder, Annamalaiar College of
Engineering, for giving us the opportunity to complete our study and the
project well in advance.

It is my great pleasure to acknowledge the assistance and contributions of


people especially our PRINCIPALDr.R.KANNAN,M.E.,
Ph.D.,Annamalaiar College of Engineering, who got the whole thing started
and who gave us the chance to express ourselves.

I would like to express my deep gratitude and appreciation to our Project


Co-ordinator Ms C.K.REVATHI,,M.Tech.,Head of the Department,
Computer Science and Engineering, for giving details, guidelines,
stimulating suggestions and encouragement which helped me to coordinate my
project.

I take this opportunity to express my profound gratitude and deep regards to my


Supervisor,Ms C.K.REVATHI,,M.Tech.,Head of theDepartment of
Computer Science and Engineering, for her exemplary guidance, monitoring
and constant encouragement throughout the project. The blessing, help and
guidance given by her time to time shall carry me a long way in the journey of
life on which I am about to embark.
Lastly, I thank almighty, all the staff members and my parents for their
constant encouragement without which this assignment would not be possible.
ABSTRACT

Botnets have become major engines for malicious activities in cyberspace


nowadays. To sustain their botnets and disguise their malicious actions, botnet
owners are mimicking legitimate cyber behavior to fly under the radar. This
poses a critical challenge in anomaly detection. In this paper, we use web
browsing on popular websites as an example to tackle this problem. First of all,
we establish a semi-Markov model for browsing behavior. Based on this model,
we find that it is impossible to detect mimicking attacks based on statistics if the
number of active bots of the attacking botnet is sufficiently large (no less than
the number of active legitimate users). However, we also find it is hard for
botnet owners to satisfy the condition to carry out a mimicking attack most of
the time. With this new finding, we conclude that mimicking attacks can be
discriminated from genuine flash crowds using second order statistical metrics.
We define a new fine correntropy metrics and show its effectiveness compared
to others. Our real world data set experiments and simulations confirm our
theoretical claims. Furthermore, the findings can be widely applied to similar
situations in other research fields.

i
CHAPTER TITLE PAGE NO

ABSTRACT I
LIST OF FIGURES V
LIST OF ABBREVIATIONS Vi
1 INTRODUCTION 1
1.1 AIM 1
1.2 MOTIVATION 1
2 SYSTEM ANALYSIS 3
2.1 LITERATURE SURVEY 3
2.2 SYSTEM STUDY 5
2.3 EXISTING SYSTEM 6
2.3.1 DISADVANTAGES 6
2.4 PROPOSED SYSTEM 7
2.4.1 ADVANTAGES 8
3 SYSTEM SPECIFICATION 9
3.1 HARDWARE REQUIREMENTS 9
3.2 SOFTWARE REQUIREMENTS 9
4 SYSTEM DESIGN 10
4.1 SYSTEM ARCHITECTURE 10
4.2 LIST OF MODULES 12
4.3 MODULES DESCRIPTION 12
4.3.1 FAIR EXCHANGE BETWEEN 12
NODE AND BOTNETS

14
4.3.2 CYBERSPACE DATA
VERIFICATION

ii
4.3.3 MIMICKING ATTACKS 15
EVALUATED
4.3.4 NON INTERACTIVE ZERO 16
KNOWLEDGE

4.4 DATA FLOW DIAGRAM 18


4.5USE CASE DIAGRAM 21
4.6ACTIVITY DIAGRAM 22
4.7SEQUENCE DIAGRAM 24
4.8COLLABORATION DIAGRAM 26
4.9 CLASS DIAGRAM 27
5 SOFTWARE IMPLEMENTATION 28
5.1 LANGUAGE SPECIFICATION 28
5.2 SOFTWARE TESTING 39
5.2.1 UNIT TESTING 39
5.2.2 INTEGRATION TESTING 39
5.2.3 FUNCTIONAL TESTING 40
5.2.4 SYSTEM TESTING 40
5.2.5 WHITE BOX TESTING 41
5.2.6 BLACK BOX TESTING 41
6 CONCLUSION AND FUTURE 43
ENHANCEMENT
6.1 CONCLUSION 43
6.2 FUTURE ENHANCEMENT 43

iii
7 APPENDICES 44
7.1 SAMPLIND CODE 44
7.1.1 MAIN SERVER 44
7.1.2 NODE 47
7.1.2.1 DATABASE CONNECTION 47
7.1.2.2 KEY GENERATION 48
7.1.2.3 SERVER ADDRESS 49
7.2 SNAPSHOTS 50
7.2.1 MAIN SERVER 50
7.2.1.1 SERVER RUNNING 50
7.2.2 NODE 51
7.2.2.1 CYBERSPACE 51
7.2.2.2 USER 52
7.2.2.3 BOTNET 53
7.2.2.4 VERIFICATON 54
7.2.2.5 FILE REQUEST 55
7.2.2.6 BOTNET REQUEST 56

8 REFERENCES 58

vi
FIG NO FIGURES
LIST OF FIGURES PAGE NO

4.1 SYSTEM ARCHITECTURE 14

4.3.1 FAIR EXCHANGE BETWEEN 15


NODE AND BOTNET

CYBERSPACE DATA
4.3.2 16
LIST OF FIGURES
VERIFICATION
4.3.3 17
MIMICKING ATTACK
EVALUATED

4.3.4 NON INTERACTIVE ZERO 18

KNOWLEDGE

4.4.1 DFD LEVEL 0 19

4.4.2 DFD LEVEL 1 20

4.4.3 DFD LEVEL 2 20

4.5 USE CASE DIAGRAM 21

4.6 ACTIVITY DIAGRAM 22

4.7 SEQUENCE DIAGRAM 23

4.8 COLLABORATION DIAGRAM 24

4.9 CLASS DIAGRAM 25

v
LIST OF ABBREVATIONS

S.NO ABBREVIATIONS DESCRIPTION

1 NZK NON interactive ZERO


KNOWLEDGE

2 FE FAIR EXCHANGE

3 EE ELGAMEL ENCRYPTION

vi

You might also like