SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Engineering Research and Development 
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com 
Volume 10, Issue 7 (July 2014), PP.81-84 
Tracking rogue device in wireless Network System 
1Prof. Amolkumar N. Jadhav, 2Prof. Shounak Sugave, 
3Prof. Hanmant Magar, 4Prof. Chudaman Sukte 
1,2,3,4Assistant Professor MIT College of Engineering, Pune India 
Abstract:- Rough Device is one of the leading security threats in current network scenario, if not properly 
handled in time could lead from minor network faults to serious network failure. Most of the current solutions to 
detect rough device are not automated and are dependent on a specific wireless technology. In this p deviceer I 
used the integrated solution for detection and eliminate the rogue Device. Rogue detection algorithm is also 
proposed. This Methodology uses two properties: (1) doesn’t require any specialized hardware; (2) the used 
algorithm detects and completely eliminate Rough device from network; this solution is effective and low cost. 
Keywords:- Rogue device , Wireless Security, Mobile Agents,Wireless LANs. 
I. INTRODUCTION 
Many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet 
enabling the flexible workforce. Employees are able to move their computers from one location to another. 
While doing so, communications with peers and the Internet are continuously maintained. It has been clearly 
shown that utilizing wireless LAN helps increasing the productivity of a company that is using it. However the 
wireless security is always a primary concern. The information transmitted by the users is broadcasted through 
the air. Everybody within range of the wireless signal can easily tune in and device ture the data. Most enterprise 
wireless implementations normally include the wireless security measure such as IEEE 802.11i or WPA 
(Wireless Protected Access). IEEE 802.11i provides the encryption and authentication mechanisms to protect 
user from unauthorized access and data eavesdrop over the wireless network. However, such security measures 
cannot protect the system from the unauthorized installation of the device by their own staffs. The staffs can 
easily plug in the unauthorized device (normally called rogue device) to the network for their personal usage. 
Most staffs are unaware of the security threats that come along with this act. The unauthorized user or hacker 
can bypass the company’s line of network defenses (i.e., firewall, access control) through the rogue device and 
poses the serious threat to the organization. 
A Rogue device is typically referred to as an unauthorized DEVICE in the literature. It is a wireless 
device that has either been installed on a secure network without explicit authorization from a local 
administrator, or has been created to allow a cracker to conduct a man-in –the middle attack or can be used by 
adversaries for committing espionage and launching attacks. 
Rogue devices are present on about 20% of all enterprise networks. Often these ―Rogue‖ devices might be 
installed by valid user attempting to increase the range of the network but doing so without proper authorization. 
This usually results in a security hole that may be exploited by intruders, or intruder himself planting an 
DEVICE with a higher broadcast power than normal to masquerade as a legitimate device 
81 
1) Access Point 2) Switch 3) Central System 
Fig. Rough device is trying to access data share between them with high signal.
Tracking rogue device in wireless Network System 
82 
Approach For Detecting Rough Devices : 
This algorithm is proposed by Prof S. B. vanjale Most of the current deviceproaches for detecting 
rogue DEVICEs are rudimentary and easily evaded by hackers. Some organizations have equipped IT 
personnel with wireless packet analyzer algorithm fig-1, forcing IT personnel to walk the halls of the enterprise 
or campus searching for rogue DEVICEs. This method is generally ineffective because manual scans are time-consuming 
and expensive – and, therefore, are conducted infrequently. Also, with 802.11 hardware operating at 
separate frequencies (802.11a - 5Ghz and 802.11b - 2.4Ghz), IT personnel must upgrade their detection devices 
to accommodate multiple frequencies. Moreover, scans are easy to elude, since a rogue DEVICE can easily be 
unplugged when the scan takes place.[1] 
Wireless Traffic Analyzer Algorithm:- 
For (each flow between sender and receiver) 
{ n =0 
for (the first N packet) 
{ n = n+1; 
ΔTn = Tn +Tn+1 
// Tn is arrival of n th packet 
Comput the median of inter arrival times M(ΔTn) 
If ( M(ΔTn) ≤ 5ms ) 
Then classify sender as ethernate 
Else 
Specify the sender as a wireless } 
The potential rogue device data is stored in the database waiting for analyzed. Central system analyzes 
the rogue devices based on the detection algorithm shown in Figure 2. The algorithms are the follows: 
1) Compare the sniffing data (i.e., SSID, Wireless MAC) with the authorized DEVICE information. 
The authorized DEVICE information is stored beforehand. There are three possible outcomes: Completely 
Matched (SSID and MAC), Completely Unmatched (not SSID and not MAC) and Partially Matched (not SSID 
but MAC, or SSID but not MAC). If completely matched, goto stage 2). If Partially Matched, goto stage 3) and 
If Completely Unmatched goto stage 4) 
2) For Completely Matched, there are two possibilities of devices: Trusted DEVICE or Attacker 
Rogue device. The attacker rogue device completely spoofs the authorized device information (i.e., spoof MAC 
and spoof SSID). Typically it is hard to verify if an device is the legitimate one. Therefore, we propose the 
technique that can differentiate Trust devices from Spoof Rogue DEVICE using timestamp information within 
Beacon. Normally each Device will includes the timestamp on the Beacon. The timestamp is total uptime of the 
device measured since its start. Even though the attackers can manipulate the spoof SSID and wireless MAC, 
they will have the difficult time trying to synchronize and spoof timestamp of the trusted device. 
3) For Partially Matched, the result would be either Misconfiguration DEVICE or Attacker’s Rogue 
DEVICE. The Misconfiguration DEVICE is the device with configuration that is not consistent to the registered 
DEVICE. Verifying the configuration of all DEVICEs will remove the outcome of Misconfiguration DEVICE 
and leave remaining of Attacker’s Rogue DEVICE. 
4) For Completely Unmatched, the result would be either Neighborhood DEVICE or Employee rogue 
DEVICE. If the DEVICE connects to the external network, we can assume that it is Neighborhood DEVICE. If 
the DEVICE connects to the internal network, it is Employee rogue DEVICE. The technique to perform 
―DEVICE internal connection checking‖ or DEVICE localization is described in the next section. 
The potential rogue device data is stored in the database waiting for analyzed. Central system analyzes 
the rogue device based on the detection algorithm shown in Figure 2. The algorithms are the follows: 
1) Compare the sniffing data (i.e., SSID, Wireless MAC) with the authorized DEVICE information. 
The authorized DEVICE information is stored beforehand. There are three possible outcomes: Completely 
Matched (SSID and MAC), Completely Unmatched (not SSID and not MAC) and Partially Matched (not SSID 
but MAC, or SSID but not MAC). If Completely Matched, goto stage 2). If Partially Matched, goto stage 3) and 
If Completely Unmatched goto stage 4) 
2) For Completely Matched, there are two possibilities of devices: Trusted DEVICE or Attacker 
Rogue DEVICE. The attacker rogue DEVICE completely spoofs the authorized DEVICE information (i.e., 
spoof MAC and spoof SSID). Typically it is hard to verify if an DEVICE is the legitimate one. Therefore, we 
propose the technique that can differentiate Trust DEVICEs from Spoof Rogue DEVICE using timestamp 
information within Beacon. Normally each device will include the timestamp on the Beacon. The timestamp is 
total uptime of the device measured since its start. Even though the attackers can manipulate the spoof SSID and
Tracking rogue device in wireless Network System 
wireless MAC, they will have the difficult time trying to synchronize and spoof timestamp of the trusted 
DEVICE. 
3) For partially matched, the result would be either Misconfiguration DEVICE or Attacker’s Rogue 
DEVICE. The Misconfiguration DEVICE is the device with configuration that is not consistent to the registered 
DEVICE. Verifying the configuration of all DEVICEs will remove the outcome of Misconfiguration DEVICE 
and leave remaining of Attacker’s Rogue DEVICE. 
4) For Completely Unmatched, the result would be either Neighborhood DEVICE or Employee rogue 
DEVICE. If the DEVICE connects to the external network, we can assume that it is Neighborhood DEVICE. If 
the DEVICE connects to the internal network, it is Employee rogue DEVICE. The technique to perform 
―DEVICE internal connection checking‖ or DEVICE localization is described in the next section. 
In this section, we perform the experiment to show how the proposed system can detect the various types of 
rogue access point. We define four types rogue device. 
1.Rogue Type 1: Employee’s rogue access point, no SSID spoof and no wireless MAC spoof 
2.Rogue Type 2: Attacker’s rogue access point, with SSID spoof but no wireless MAC spoof 
3.Rogue Type 3: Attacker’s rogue access point, with no SSID spoof but wireless MAC spoof 
4.Rogue Type 4: Attacker’s rogue access point, with Rogue SSID spoof and wireless MAC spoof. 
II. CONCLUSION 
In this paper I propose the Detecting & Eliminating the rogue device. Classification of rogue Device 
and related risk assessment is analyzed. Rogue detection algorithm is also proposed. Our proposed solution is 
effective and low cost. It is designed to utilize the existing wireless LAN infrastructure. There is no need to 
acquire the new RF devices or dedicated wireless detection sensors. The experiments in the real system are 
demonstrated. 
REFERENCES 
[1]. Detecting & Eliminating Rogue device in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, 
Pramod A. Jadhav Department of Computer Engg. Bharati Vidy deviceeeth Deemed University 
College of Engineering Pune svanjale@rediffmail.com, akkadam@bvucoep.edu.in, 
pramodjadhav1408@gmail.com 
[2]. Detecting and Eliminating Rogue Access Points in IEEE-802.11 WLAN - A Multi-Agent Sourcing 
Methodology V. S. Shankar Sriram1, G.Sahoo3 Department of Information Technology, Birla Institute 
of Technology, Mesra, Ranchi, India sriram@bitmesra.ac.in, drgsahoo@yahoo.com 
[3]. Cisco Wireless LAN Controller Configuration Guide, Release 5.0— 
http://www.cisco.com/en/US/products/ps6366/products_configuration_guide_book09186a008082d572. 
html. 
[4]. NIST SP 800-18, Guide for Developing Security Plans for Information Technology Systems, provides 
details on access control issues, and developing and updating security plans. 
[5]. NIST SP 800-34, Contingency Planning Guide for Information Technology Systems, gives information 
on coordinating contingency planning activities. 
[6]. John Bellardo and Stefan Savage, ―802.11 Denial-of-Service Attacks: Real Vulnerabilities and 
Practical Solutions‖, 2003, Usenix 2003 Proceedings. 
http://www.cs.ucsd.edu/users/savage/papers/UsenixSec03.pdf Retrieved Jan 20, 2004. 
[7]. IEEE, IEEE 802.11 standards documents, http://standards.ieee.org/wireless/ . Retrieved Jan 20, 2004 
[8]. Tom Karygiannis and Les Owens, Wireless Network Security: 802.11, Bluetooth and Handheld 
Devices, National Institute of Standards and Technology Special Publication 800-48, November 2002. 
83
Tracking rogue device in wireless Network System 
http://cs-www.ncsl.nist.gov/publications/ nistpubs/800-48/NIST_SP_800-48.pdf . Retrieved Jan 20, 
2004 
[9]. Rob Flickenger, Wireless Hacks: 100 Industrial-Strength Tips & Tools, 286 pages, O'Reilly & 
Associates, September 2003, ISBN: 0-596-00559-8 
[10]. Joshua Wright, ―Detecting Wireless LAN MAC Address Spoofing‖, Retrieved on Jan 20, 2004. 
84 
http://home.jwu.edu/jwright/ 
[11]. Suman Jana and Sneha Kumar Kasera. On fast andaccurate detection of authorized wireless 
accesspoints using clock skews. In MobiCom ’08:Proceedings of the 14th ACM international 
conferenceon Mobile computing and networking, pages 104–115.ACM, 2008. 
[12]. Lanier Watkins, RaheemBeyah, Cherita Corbett ―A Passive Approach to Rogue Access Point 
Detection‖ 1930-529X/07/$25.00 © 2007 IEEE 
[13]. Potential Security Threats of a wireless network 
http://www.infosecwriters.com/text_resources/pdf/Wireless_JMeyer.pdf 
[14]. Threats to Wireless Local Area Network (WLAN) and Countermeasures‖ ,A.V.Dhaygude, K.R. Patil, 
A.A.Sawant ,ICONS’07,January 27-29,2007,Ero de,Tamilnadu,India. 
[15]. Suman Jana and Sneha Kumar Kasera. On fast andaccurate detection of nauthorized wireless 
accesspoints using clock skews. In MobiCom ’08:Proceedings of the 14th ACM international 
conferenceon Mobile computing and networking, pages 104–115.ACM, 2008

Más contenido relacionado

La actualidad más candente

Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionSagar Uday Kumar
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...skpatel91
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesYOU SHENG CHEN
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkVinayak Raja
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 

La actualidad más candente (18)

Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Using Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion DetectionUsing Genetic algorithm for Network Intrusion Detection
Using Genetic algorithm for Network Intrusion Detection
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Network security
Network securityNetwork security
Network security
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
Paper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devicesPaper sharing_Edge based intrusion detection for IOT devices
Paper sharing_Edge based intrusion detection for IOT devices
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 

Destacado

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Destacado (18)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
F1074547
F1074547F1074547
F1074547
 
B1081218
B1081218B1081218
B1081218
 
E1072850
E1072850E1072850
E1072850
 
C1081826
C1081826C1081826
C1081826
 
A1070108
A1070108A1070108
A1070108
 
D1072232
D1072232D1072232
D1072232
 
B1071014
B1071014B1071014
B1071014
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
JN Resume (1)
JN Resume (1)JN Resume (1)
JN Resume (1)
 

Similar a International Journal of Engineering Research and Development

Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network IJECEIAES
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Tiffany Sandoval
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
 
17.security level of services
17.security level of services17.security level of services
17.security level of servicesPramod Rathore
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEIRJET Journal
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Tim Wright
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system운상 조
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far AlleneMcclendon878
 
Information security
Information securityInformation security
Information securityBhushan Gurav
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerIRJET Journal
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 

Similar a International Journal of Engineering Research and Development (20)

Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
17.security level of services
17.security level of services17.security level of services
17.security level of services
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Information security
Information securityInformation security
Information security
 
Intercept product
Intercept productIntercept product
Intercept product
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.81-84 Tracking rogue device in wireless Network System 1Prof. Amolkumar N. Jadhav, 2Prof. Shounak Sugave, 3Prof. Hanmant Magar, 4Prof. Chudaman Sukte 1,2,3,4Assistant Professor MIT College of Engineering, Pune India Abstract:- Rough Device is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rough device are not automated and are dependent on a specific wireless technology. In this p deviceer I used the integrated solution for detection and eliminate the rogue Device. Rogue detection algorithm is also proposed. This Methodology uses two properties: (1) doesn’t require any specialized hardware; (2) the used algorithm detects and completely eliminate Rough device from network; this solution is effective and low cost. Keywords:- Rogue device , Wireless Security, Mobile Agents,Wireless LANs. I. INTRODUCTION Many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. Employees are able to move their computers from one location to another. While doing so, communications with peers and the Internet are continuously maintained. It has been clearly shown that utilizing wireless LAN helps increasing the productivity of a company that is using it. However the wireless security is always a primary concern. The information transmitted by the users is broadcasted through the air. Everybody within range of the wireless signal can easily tune in and device ture the data. Most enterprise wireless implementations normally include the wireless security measure such as IEEE 802.11i or WPA (Wireless Protected Access). IEEE 802.11i provides the encryption and authentication mechanisms to protect user from unauthorized access and data eavesdrop over the wireless network. However, such security measures cannot protect the system from the unauthorized installation of the device by their own staffs. The staffs can easily plug in the unauthorized device (normally called rogue device) to the network for their personal usage. Most staffs are unaware of the security threats that come along with this act. The unauthorized user or hacker can bypass the company’s line of network defenses (i.e., firewall, access control) through the rogue device and poses the serious threat to the organization. A Rogue device is typically referred to as an unauthorized DEVICE in the literature. It is a wireless device that has either been installed on a secure network without explicit authorization from a local administrator, or has been created to allow a cracker to conduct a man-in –the middle attack or can be used by adversaries for committing espionage and launching attacks. Rogue devices are present on about 20% of all enterprise networks. Often these ―Rogue‖ devices might be installed by valid user attempting to increase the range of the network but doing so without proper authorization. This usually results in a security hole that may be exploited by intruders, or intruder himself planting an DEVICE with a higher broadcast power than normal to masquerade as a legitimate device 81 1) Access Point 2) Switch 3) Central System Fig. Rough device is trying to access data share between them with high signal.
  • 2. Tracking rogue device in wireless Network System 82 Approach For Detecting Rough Devices : This algorithm is proposed by Prof S. B. vanjale Most of the current deviceproaches for detecting rogue DEVICEs are rudimentary and easily evaded by hackers. Some organizations have equipped IT personnel with wireless packet analyzer algorithm fig-1, forcing IT personnel to walk the halls of the enterprise or campus searching for rogue DEVICEs. This method is generally ineffective because manual scans are time-consuming and expensive – and, therefore, are conducted infrequently. Also, with 802.11 hardware operating at separate frequencies (802.11a - 5Ghz and 802.11b - 2.4Ghz), IT personnel must upgrade their detection devices to accommodate multiple frequencies. Moreover, scans are easy to elude, since a rogue DEVICE can easily be unplugged when the scan takes place.[1] Wireless Traffic Analyzer Algorithm:- For (each flow between sender and receiver) { n =0 for (the first N packet) { n = n+1; ΔTn = Tn +Tn+1 // Tn is arrival of n th packet Comput the median of inter arrival times M(ΔTn) If ( M(ΔTn) ≤ 5ms ) Then classify sender as ethernate Else Specify the sender as a wireless } The potential rogue device data is stored in the database waiting for analyzed. Central system analyzes the rogue devices based on the detection algorithm shown in Figure 2. The algorithms are the follows: 1) Compare the sniffing data (i.e., SSID, Wireless MAC) with the authorized DEVICE information. The authorized DEVICE information is stored beforehand. There are three possible outcomes: Completely Matched (SSID and MAC), Completely Unmatched (not SSID and not MAC) and Partially Matched (not SSID but MAC, or SSID but not MAC). If completely matched, goto stage 2). If Partially Matched, goto stage 3) and If Completely Unmatched goto stage 4) 2) For Completely Matched, there are two possibilities of devices: Trusted DEVICE or Attacker Rogue device. The attacker rogue device completely spoofs the authorized device information (i.e., spoof MAC and spoof SSID). Typically it is hard to verify if an device is the legitimate one. Therefore, we propose the technique that can differentiate Trust devices from Spoof Rogue DEVICE using timestamp information within Beacon. Normally each Device will includes the timestamp on the Beacon. The timestamp is total uptime of the device measured since its start. Even though the attackers can manipulate the spoof SSID and wireless MAC, they will have the difficult time trying to synchronize and spoof timestamp of the trusted device. 3) For Partially Matched, the result would be either Misconfiguration DEVICE or Attacker’s Rogue DEVICE. The Misconfiguration DEVICE is the device with configuration that is not consistent to the registered DEVICE. Verifying the configuration of all DEVICEs will remove the outcome of Misconfiguration DEVICE and leave remaining of Attacker’s Rogue DEVICE. 4) For Completely Unmatched, the result would be either Neighborhood DEVICE or Employee rogue DEVICE. If the DEVICE connects to the external network, we can assume that it is Neighborhood DEVICE. If the DEVICE connects to the internal network, it is Employee rogue DEVICE. The technique to perform ―DEVICE internal connection checking‖ or DEVICE localization is described in the next section. The potential rogue device data is stored in the database waiting for analyzed. Central system analyzes the rogue device based on the detection algorithm shown in Figure 2. The algorithms are the follows: 1) Compare the sniffing data (i.e., SSID, Wireless MAC) with the authorized DEVICE information. The authorized DEVICE information is stored beforehand. There are three possible outcomes: Completely Matched (SSID and MAC), Completely Unmatched (not SSID and not MAC) and Partially Matched (not SSID but MAC, or SSID but not MAC). If Completely Matched, goto stage 2). If Partially Matched, goto stage 3) and If Completely Unmatched goto stage 4) 2) For Completely Matched, there are two possibilities of devices: Trusted DEVICE or Attacker Rogue DEVICE. The attacker rogue DEVICE completely spoofs the authorized DEVICE information (i.e., spoof MAC and spoof SSID). Typically it is hard to verify if an DEVICE is the legitimate one. Therefore, we propose the technique that can differentiate Trust DEVICEs from Spoof Rogue DEVICE using timestamp information within Beacon. Normally each device will include the timestamp on the Beacon. The timestamp is total uptime of the device measured since its start. Even though the attackers can manipulate the spoof SSID and
  • 3. Tracking rogue device in wireless Network System wireless MAC, they will have the difficult time trying to synchronize and spoof timestamp of the trusted DEVICE. 3) For partially matched, the result would be either Misconfiguration DEVICE or Attacker’s Rogue DEVICE. The Misconfiguration DEVICE is the device with configuration that is not consistent to the registered DEVICE. Verifying the configuration of all DEVICEs will remove the outcome of Misconfiguration DEVICE and leave remaining of Attacker’s Rogue DEVICE. 4) For Completely Unmatched, the result would be either Neighborhood DEVICE or Employee rogue DEVICE. If the DEVICE connects to the external network, we can assume that it is Neighborhood DEVICE. If the DEVICE connects to the internal network, it is Employee rogue DEVICE. The technique to perform ―DEVICE internal connection checking‖ or DEVICE localization is described in the next section. In this section, we perform the experiment to show how the proposed system can detect the various types of rogue access point. We define four types rogue device. 1.Rogue Type 1: Employee’s rogue access point, no SSID spoof and no wireless MAC spoof 2.Rogue Type 2: Attacker’s rogue access point, with SSID spoof but no wireless MAC spoof 3.Rogue Type 3: Attacker’s rogue access point, with no SSID spoof but wireless MAC spoof 4.Rogue Type 4: Attacker’s rogue access point, with Rogue SSID spoof and wireless MAC spoof. II. CONCLUSION In this paper I propose the Detecting & Eliminating the rogue device. Classification of rogue Device and related risk assessment is analyzed. Rogue detection algorithm is also proposed. Our proposed solution is effective and low cost. It is designed to utilize the existing wireless LAN infrastructure. There is no need to acquire the new RF devices or dedicated wireless detection sensors. The experiments in the real system are demonstrated. REFERENCES [1]. Detecting & Eliminating Rogue device in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg. Bharati Vidy deviceeeth Deemed University College of Engineering Pune svanjale@rediffmail.com, akkadam@bvucoep.edu.in, pramodjadhav1408@gmail.com [2]. Detecting and Eliminating Rogue Access Points in IEEE-802.11 WLAN - A Multi-Agent Sourcing Methodology V. S. Shankar Sriram1, G.Sahoo3 Department of Information Technology, Birla Institute of Technology, Mesra, Ranchi, India sriram@bitmesra.ac.in, drgsahoo@yahoo.com [3]. Cisco Wireless LAN Controller Configuration Guide, Release 5.0— http://www.cisco.com/en/US/products/ps6366/products_configuration_guide_book09186a008082d572. html. [4]. NIST SP 800-18, Guide for Developing Security Plans for Information Technology Systems, provides details on access control issues, and developing and updating security plans. [5]. NIST SP 800-34, Contingency Planning Guide for Information Technology Systems, gives information on coordinating contingency planning activities. [6]. John Bellardo and Stefan Savage, ―802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions‖, 2003, Usenix 2003 Proceedings. http://www.cs.ucsd.edu/users/savage/papers/UsenixSec03.pdf Retrieved Jan 20, 2004. [7]. IEEE, IEEE 802.11 standards documents, http://standards.ieee.org/wireless/ . Retrieved Jan 20, 2004 [8]. Tom Karygiannis and Les Owens, Wireless Network Security: 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology Special Publication 800-48, November 2002. 83
  • 4. Tracking rogue device in wireless Network System http://cs-www.ncsl.nist.gov/publications/ nistpubs/800-48/NIST_SP_800-48.pdf . Retrieved Jan 20, 2004 [9]. Rob Flickenger, Wireless Hacks: 100 Industrial-Strength Tips & Tools, 286 pages, O'Reilly & Associates, September 2003, ISBN: 0-596-00559-8 [10]. Joshua Wright, ―Detecting Wireless LAN MAC Address Spoofing‖, Retrieved on Jan 20, 2004. 84 http://home.jwu.edu/jwright/ [11]. Suman Jana and Sneha Kumar Kasera. On fast andaccurate detection of authorized wireless accesspoints using clock skews. In MobiCom ’08:Proceedings of the 14th ACM international conferenceon Mobile computing and networking, pages 104–115.ACM, 2008. [12]. Lanier Watkins, RaheemBeyah, Cherita Corbett ―A Passive Approach to Rogue Access Point Detection‖ 1930-529X/07/$25.00 © 2007 IEEE [13]. Potential Security Threats of a wireless network http://www.infosecwriters.com/text_resources/pdf/Wireless_JMeyer.pdf [14]. Threats to Wireless Local Area Network (WLAN) and Countermeasures‖ ,A.V.Dhaygude, K.R. Patil, A.A.Sawant ,ICONS’07,January 27-29,2007,Ero de,Tamilnadu,India. [15]. Suman Jana and Sneha Kumar Kasera. On fast andaccurate detection of nauthorized wireless accesspoints using clock skews. In MobiCom ’08:Proceedings of the 14th ACM international conferenceon Mobile computing and networking, pages 104–115.ACM, 2008