Thesis Proposal

Read Complete Research Material

THESIS PROPOSAL

A Study on Security Protocols for Hacking Prevention

By



Table of Contents

LIST OF TABLESiii

INTRODUCTION1

VULNERABILITY/ WEAKNESS2

Stealing Password2

Foot Printing3

Forge Target Address Attack5

Rootkit or Backdoor5

Thumbsucking6

Posing7

Pod Slurping7

Blue Snarfing8

Spyware9

Abuse Shooter's CH Attack10

Foot Printing10

RESISTANCE/SUSTAINABILITY12

ARIP Routing Protocol12

Confirm RG Protocol12

Watching Protocol12

Permit Protocol13

Defending Against Forge Target Address Attack13

Defending Against Abuse Ask Message Attack14

Defending Against Abuse Shooter's CH Attack14

Simulation Environment15

Performance Metrics15

Simulation Results16

SECURITY FRAMEWORK18

Advanced Alert System (AAS)18

Data Encryption (DE)18

Functional Design18

Information Flow18

Log Messages20

Emails, SMSs and Snapshots21

Conclusion21

References24

LIST OF TABLES

Table 1: Vulnerability/ Weakness11

Table 2: Resistance/Sustainability17

Table 3: Security Framework22

INTRODUCTION

Usually when a hacker plans to attack a node in the network, he needs to get hold of the victim's IP address. The IP address reveals the point of entry to the computer of the victim and can be used to trace the enterprise's network or a public terminal. In MANETs, the IP of a mobile node is a unique identifier (Adm, 2003).

Considering the realm and understanding of the challenges and the problems associated with Mobile Ad-hoc Networks (MANET's), it becomes rather visible and clear that the disruptive influences would significantly add to the consumption of energy and power resources, raising the cost of overhead to rise vastly with the each node.

This ultimately would make way for leading to clutter communication patterns and cause experienced and maximum delay and downtime for communication specifications to take place altogether (Chang, 2007).

Extending upon the overhead cost to rise, the consumption of energy would cause the nodes to saturate. It is because of this, it makes way for some of the packets placed at those nodes, which requires extraction and a complete retransmissions, which cause the disposal and wastage of important communication resources (Chiappa, 2009).

Therefore, as an end result, a circumstance or a situation that is reminiscent to that of the black hole in this traffic may appear altogether, making the entire network be severally affected because of the excessive packet delay (Desilva & Boppana, 2005). For the researcher, keeping in lieu of these uncertainities to occur bullets critical network performance parameters, which maybe affected by these destructive attacks upon mobile nodes.

Packets Delay: To begin with the listings of the attacks, they influence the functionality and movement of the normal nodes that exist in the operation and movement of the nodes, causing them to drop from the loop altogether (Egevang and Francis, 2006). Hence as a result, a heightened and accelerated increase in the weight and measurement of packets delay for these nodes as the MANET's become evident.

Packet Loss Rate: With the constant rise and strikes of these malicious attacks, the buffer space, which is the room for safety and security at the time of attacks, may become severally affected and exhausted (Ezzouhairi, 2005).

It is because of being on constant protocol and servicing, packets that may arrive may ultimately or in most cases has to be discarded altogether. Therefore, as this situation occur, a definitive rise in the measurement of loss of packets for the nodes in MANET's is observed (Gui, 2003).

Collision Rate: With the occurrence of these malicious attacks, the nodes then are ought to develop ...
Related Ads