Presentation is loading. Please wait.

Presentation is loading. Please wait.

Study of Malformed Message Attacks and their Prevention By Shailesh Yadav & Nikhil Mohod TEL 500 PROJECT.

Similar presentations


Presentation on theme: "Study of Malformed Message Attacks and their Prevention By Shailesh Yadav & Nikhil Mohod TEL 500 PROJECT."— Presentation transcript:

1 Study of Malformed Message Attacks and their Prevention By Shailesh Yadav & Nikhil Mohod TEL 500 PROJECT

2  Introduction  The importance of Networking monitoring  Last Hop Tracking: Framework  The Project  The CNM  Packet Tracer Demo  Real time Demo  Conclusion

3  Devised to achieve unauthorized access into the service provider’s secure domain  In this type of attacks the attacker modifies the headers in such a way that it does not comply with the grammar standards of the Signaling protocol

4

5  Focus of this project is to help design network breach detection and tracing system, a suggestive system with important parameters  This design is going to aid the prevention on malformed message attacks and also ensure that these type and attacks and their origin is easily figured out

6  If the network is monitored, quite once in a while the assault is followed straightforwardly back to the perpetrator  This is done by last hop tracing with the help of the foundation built by IDS and IPS  Hence there is great demand for design, deployment and maintaining frameworks that aid towards the goal of monitoring networks

7

8  Wireshark V 1.10.2  Bittwist V

9  This CNM system is recognized as the solution  This design is a variation of inbuilt IDS IPS system that could be established with the existing network infrastructure  The aspects of the CNM are as follows:  Route Isolation  Hassle free routing for all other networking protocols running  An algorithm to recognize the malformed message attacks and distinguish them from other types of attacks  Also be able to detect and prevent network based attacks  Reduce the cost of deploying a separate infrastructure for CNM  Last hop tracing to allow easy detecting of the attack’s origin

10  The CNM should be kept isolated from the rest of the network  All other routing components should be able to flow freely without hassle  The above two issues are explored in detail in this project the other aforementioned components are a part of the CNM documentation (Future Research)

11

12 Packet Tracer Screenshot

13  SIP being a text based protocol is very easy to exploit. Most security threats could be condensed by the use of TCP/IP instead of UDP for signaling purposes. As previously mentioned, firewalls can also be used in addition to TCP/IP used, to block unauthorized access.  Also access lists could be used

14 Questions ?


Download ppt "Study of Malformed Message Attacks and their Prevention By Shailesh Yadav & Nikhil Mohod TEL 500 PROJECT."

Similar presentations


Ads by Google