Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
evaluating the vulnerability of network traffic using joint security routing analysi
#1

Evaluating the Vulnerability of Network Traffic
Using Joint Security and Routing Analysis


Abstract:
The Joint analysis of security and routing protocols together in wireless networks brings out the vulnerabilities of secure network traffic that would otherwise remain undetected when security and routing protocols are examined independently.Here, a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols is formulated. set theoretic and circuit theoretic interpretations of the security of network traffic are used. These approaches allow a network analyst or an adversary to determine weaknesses in the secure network. The node capture attacks using the vulnerability metric has been formalised as a nonlinear integer programming minimization problem and propose the GNAVE(Greedy Node capture Approximation using Vulnerability Evaluation.
) algorithm. the availability of security parameters to the adversary is discussed and reach the conclusion that unknown parameters can be estimated using probabilistic analysis. The vulnerability evaluation using the proposed metrics and node capture attacks are demonstrated using the GNAVE algorithm through detailed examples and simulation.

Existing System:
The prevoius studies on node capture attacks mentioned here have all focused on the ability of an adversary to compromise the security of single-hop wireless links. But messages in a wireless network traverse multiple links and paths between a source and destination node, and a message may be compromised by traversing a single insecure link.

Disadvantage:
a message may be compromised by traversing a single insecure page link as the messages in a wireless network traverse multiple links and paths between a source and destination node.

Proposed System:
A class of metrics for the vulnerability of network traffic is defined and the minimum cost node capture attack problem as a nonlinear integer program using the defined vulnerability metrics is formulated. GNAVE algorithm, a Greedy Node capture Approximation using Vulnerability Evaluation, to approximate the minimum cost node capture attack.
-When information about the key assignment protocol is hidden from the adversary using privacy-preserving protocols, the indeterminate quantities can be estimated probabilistically without significant degradation in the attack performance.
-Analogies to evaluate the message security.
-the impact of node capture attacks using the GNAVE algorithm in wireless networks is demonstrated with examples of both classical routing and network coding protocols.Also, the impact of node capture attacks using the GNAVE algorithm in wireless networks is compared with examples of both classical routing and network coding protocols.

Advantage:
Here we maintain the overall integrity and confidentiality among nodes path.
We give secure in least page link also.
Software Requirements:

Front End : Java Swing
Back End : SQL Server
Technology : ServerSocket

Hardware Requirements:

Hard disk : 40 GB
RAM : 256 Ram
Processor : Pentium IV 3GHZ

The full text pdf is available in the IEE digital library:
http://computerportal/web/csdl/doi/10.1109/TDSC.2008.60

Also i got this one:
http://ieetitlesProjects%20Abstracts/JAVA/NETWORK%20SECURITY/JANS01-IEE.doc
Reply

#2
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis

MODULE DESCRIPTIONS:

Administration should maintain the overall process of the project. Administrator only be a authenticatable person to do anything in the project. If we want add the node then first got the permission from administrator by using attack module. User registration also processed in front of admin.
Quantifying of the vulnerability was identified by administrator through the Quantifying vulnerability module.
It should contain the following modules
Add Node
Quantifying Vulnerability
Attack
Add User
Report

Add Node:

In this module can help to add the node for passing the message between the clients. It should contain two fields. Such as
Name of the node
Id of the node

Node Id is act as like a ip address of the node.

Quantifying vulnerability:

In this module can be used to remove the attack in the node. This is done by administrator .It should display the level of the attacking node in the grid view. Admin first view the list of node in the grid view, then finalize to which node having minimum level attacking on that node can released from an attacked.

Attack:

In this module can help to protect the system by stopping the process of the node.This is also done by administrator.

Add user:

In this module must be used for user registration purpose.Admin only allow the authenticated person to processing the node. In this module can help to provide the ip address for each user.

Report:

Finally admin can view the details about how many node can attacked and level of attacks. In this details are displayed in the grid view control.
Reply

#3
[attachment=4267]
Evaluating the Vulnerability of Network Traffic
Using Joint Security and Routing Analysis



ABSTRACT

Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that
remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to
evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two
complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing
a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the
vulnerability metric as a nonlinear integer programming minimization problem and propose the GNAVE algorithm, a Greedy Node
capture Approximation using Vulnerability Evaluation. We discuss the availability of security parameters to the adversary and show
that unknown parameters can be estimated using probabilistic analysis. We demonstrate vulnerability evaluation using the proposed
metrics and node capture attacks using the GNAVE algorithm through detailed examples and simulation.


Reply

#4
[attachment=1689]

ABSTRACT

Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently.

We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks.

We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network.

demonstrate vulnerability evaluation using the proposed metrics and node capture attacks using the GNAVE algorithm through detailed examples and simulation.

submitted by
Jeevan Technologies Chennai, India
Reply

#5
I need to do a project for my ECE class and I was interested in the topic: c.Evaluating the vulnerability of Network Traffic Using Joint Security and Routing Analysis. If there is any additional information available or good sources that I could use for this research project it would be greatly appreciated! Thanks
Reply

#6

could you help me out with this paper please call me in 994005906..please very urgent..
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.