200814012 Ayşe Gül ÇALIŞKAN 200814032 Erhan IŞIK ECE 491 Interm Presentation 09.12.20121 Supervisors : Halil T. EYYUBOĞLU Fahrettin DOĞAN(Türk Telekom)

Slides:



Advertisements
Similar presentations
Plain Language Writing Workshop: Strategies for Cleaning the Clutter From Your Writing Leslie OFlahavan, STC Washington, DC and Metro.
Advertisements

Chapter 9: Customer Service via Technology
April 23, Town of Lexington Allocation of Savings from Joining the GIC April 23, 2012.
Flash Testing with Selenium l 17/10/20122 Flash Testing with Selenium By Dilhan Jayakody.
Geneva, Switzerland, 11 June 2012 Future Network: Mobility Tae-Wan You ETRI, Joint ITU-T SG 13 and ISO/JTC1/SC 6 Workshop on Future Networks.
1 Milk Market Situation Brussels, 23 February 2012.
E-Flex Easy Flexitank EC41
INTRODUCTION TO REFWORKS Ben Watson and Anna Miller TEMPLEMAN LIBRARY.
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
COMPASS® ReportsCOMPASS® Reports Customized List Report Placement Summary Report KDE:OAA:js & pp:2/6/20121
Milk Market Situation Brussels, 19 January Market Situation – 19 January !!! Data from some Member States are confidential and are NOT included.
Smart Data Pricing (SDP) Soumya Sen Joint Work with: Sangtae Ha, Carlee Joe-Wong, Mung Chiang Innovating Data Plans Soumya Sen, WITE
Solving Manufacturing Equipment Monitoring Through Efficient Complex Event Processing Tilmann Rabl, Kaiwen Zhang, Mohammad Sadoghi, Navneet Kumar Pandey,
Transportation Agencies and Mobile Technologies Why hitting a moving target matters … Lloyd D. Brown, Director of Communications TransComm Social Media.
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
ARNAB BANERJEE Sanjoy pal 6/13/2014MTD Workshop, Beijing, April,
December 1, Information Technology and its Role in Indias Economic Development: A Review Nirvikar Singh Department of Economics, University of California,
Material Genome Initiative: Material Science Ontology Purusharth Prakash, Anupam Joshi, Tim Finin, Don Engel IAB Meeting Research Report 12/18/12CHMPR.
Design and construction of a mid-IR SPIDER apparatus 09/10/2012 Malte Christian Brahms Imperial College London 09/10/20121.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
International Civil Aviation Organization Runway Safety: a pan regional view for EUR/NAT States Amsterdam, 8 March 2012 Nicolas Rallo Regional Officer,
© Dr Kelvyn Youngman, May Two Diagonals – The Change Matrix Here we have the change matrix of the two principals of The Goal; Jonah and Alex Dissatisfaction.
Nagios XI 2012 Mike Guthrie Twitter: mguthrie88 Projects:
28 th TF-Mobility and Network Middleware Meeting A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks Torsten Braun.
College of Marin Enrollment Report Spring 2012 Dr. David Wain Coon Superintendent/President February 21, 2012.
Eric and Jayne go to Omaha. 9/23/2012 and 9/29/20122ISI Officials' Recertification Clinics.
Milk Market Situation Brussels, 20 September 2012.
Selecting Multiple Commodity Codes. 30/03/ Click on STATISTICS, then BUILD YOUR OWN TABLES from the drop-down menu. 2. Click on Data by Commodity.
Mexico’s Competitive Position in the New Global Economy Gordon Hanson UC San Diego and NBER November 2012.
© Dr Kelvyn Youngman, Aug Efrat's Layer 2 At the conference I graphed the 5 layers of resistance onto the change matrix as above 3. Have reservations.
Cloud Usability and End User Taxonomy Dr. Karuna P Joshi IAB Meeting Research Report June 13, /18/12CHMPR IAB
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Firewalls and Intrusion Detection Systems
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
(Geneva, Switzerland, September 2014)
DoS/DDoS Attack Forbes Henderson. What is a DoS Attack  DoS Attack (Denial of Service Attack)  A Denial of Service Attack is Often used by hackers to.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 A 曾天財 指導教授:梁明章 教授. Types of Attacks  Penetration  Eavesdropping  Man-in-the-Middle  Flooding 2.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
FIREWALL Mạng máy tính nâng cao-V1.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Presented by: Dr. Munam Ali Shah
--Harish Reddy Vemula Distributed Denial of Service.
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Hiral Chhaya CDA 6133.
DoS/DDoS attack and defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Comparison of Network Attacks COSC 356 Kyler Rhoades.
DDoS Attacks on Financial Institutions Presentation
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
Presentation transcript:

Ayşe Gül ÇALIŞKAN Erhan IŞIK ECE 491 Interm Presentation Supervisors : Halil T. EYYUBOĞLU Fahrettin DOĞAN(Türk Telekom) Gökhan BERK(Türk Telekom)

OUTLINE Introduction Why network security is needed? DoS (Denial of Service) DDoS (Distributed Denial of Service) About Company Future Work References ECE 491 Interm Presentation

INTRODUCTION Investigation of network security issues Implementation of network security issues ECE 491 Interm Presentation

Why network security is needed? According to a research done by Computer Security Institute since 1996, it was seen that information processing systems are at great risk. ECE 491 Interm Presentation

In 1998, 64% of companies and institutions which joined this research stated that they faced information processing weakness. In 2000, this rate rised to 70%. DDoS attacks have increased by 2000% in the past three years. ECE 491 Interm Presentation

Denial of Service (DoS) (Single Attack) The simplest type of attack. Attack is done via a single IP. It is easy to prevent DoS attacks. ECE 491 Interm Presentation

How to prevent DoS attack? ECE 491 Interm Presentation

8

Distributed Denial of Service (DDoS) (Multiple Attack) It is a type of attack which makes a machine or network resources unavailable. It is done by excess demand. It is not a kind of hacking. DDoS is most commonly faced attack in big internet service providers such as Türk Telekom. ECE 491 Interm Presentation

10

How to prevent DDoS attack? Firewall can not prevent DDoS. The easiest, although a costly way to prevent DDoS, is to buy more bandwidth. ECE 491 Interm Presentation

How Türk Telekom prevents DDoS attacks? The service of cleaning the traffic to minimize the damage that customer suffers in case of a DDoS (Distributed Denial of Service) attack and routing a cleaned traffic again to the customer location, by monitoring the customer traffic constantly, is called DDoS Attack Interception. ECE 491 Interm Presentation

How Çankaya University prevents DoS attacks? Çankaya University used to prevent DoS attacks by firewall. The information given by Rıdvan Kılıç (Specialist in Computer Center) ECE 491 Interm Presentation

About Company Türk Telekom has been providing communication media to its customers. Builder of - GSM, - Cable TV, - Internet. ECE 491 Interm Presentation

STUDIES IN FUTURE We are going to search for types of DDoS attacks such as SYN Flood,UDP Flood,HTTP Flood,DNS Flood. We are going to compare Çankaya University and Türk Telekom in terms of precautions that they take to prevent from the attacks. ECE 491 Interm Presentation

REFERENCES Shaffer,Steven L. & Simon, Alan R. (1994). Network Security. Önal, Huzeyfe (2010). Siber Saldırı Aracı Olarak DDoS. About Company ECE 491 Interm Presentation

ECE 491 Interm Presentation