PPT-Detection of Promiscuous nodes Using Arp Packets

Author : debby-jeon | Published Date : 2016-06-23

By Engin Arslan Introduction Threats in local networks Packet sniffing can lead to access private confidential data Use Arp packets to identify sniffers Principle

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Detection of Promiscuous nodes Using Arp..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Detection of Promiscuous nodes Using Arp Packets: Transcript


By Engin Arslan Introduction Threats in local networks Packet sniffing can lead to access private confidential data Use Arp packets to identify sniffers Principle of Sniffing Local networks are composed of Ethernet. Rodrigo Fonseca (. rfonseca. ). http://www.cs.brown.edu/courses/cs168. cs168tas@cs.brown.edu. Based partly on lecture notes by David . Mazi. ères. , Phil Levis, John . Jannotti. , Peterson & Davie. Chapter 3. 1. Chapter 3, . Community Detection and Mining in Social Media.  Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. . Community. Community. : It is formed by individuals such that those within a group interact with each other more frequently than with those outside the group. Jimeng. Sun, . Huiming. . Qu. , . Deepayan. . Chakrabarti. & Christos . Faloutsos. Presented By. Bhavana. . Dalvi. Outline. Motivation. Problem Definition. Neighborhood formation. Anomaly detection. Ali . Al-. Shemery. arabnix. [at] . gmail. All materials is licensed under a Creative Commons “Share Alike” license.. http://creativecommons.org/licenses/by-sa/3.0/. 2. # . whoami. Ali . Al-. Shemery. Problem:. Given network and noisy domain knowledge about suspicious nodes (flags), which nodes are most risky?. Cash. Money from A/P to purchase inventory. Transfer from A/R, report revenue. Accounts Payable. Abstract. Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. . inWireless. Sensor Networks. Abstract. Wireless sensor networks are vulnerable to the node clone, and several distributed protocols have been proposed to . de¬tect. this attack. . However, they require too strong assumptions to be practical for large-scale, randomly deployed sensor networks. . Zhuo. Lu. University of Memphis. Cliff Wang. Army Research Office. Mingkui Wei. NC State University. Introduction. System Models. Role Detection. Role Concealment. Conclusion. Introduction. Tactical wireless networks:. Gateways for Congestion Avoidance. *. Sally Floyd and Van Jacobson,. IEEE Transactions on Networking. , Vol.1, No. 4, (Aug 1993), pp.397-413.. Presented by Bob Kinicki. * . 7496. . citations as of . Stephen Huang. Sept. 20, 2013. News. 2. http://arstechnica.com/security/2013/09/meet-hidden-lynx-the-most-elite-hacker-crew-youve-never-heard-of/. 3. Jobs. http://www.homelandsecuritynewswire.com/dr20130809-cybersecurity-jobs-average-over-100-000-a-year. Zhuo. Lu. University of Memphis. Cliff Wang. Army Research Office. Mingkui Wei. NC State University. Introduction. System Models. Role Detection. Role Concealment. Conclusion. Introduction. Tactical wireless networks:. (. DDoS. ). Defending against Flooding-Based . DDoS. Attacks: A Tutorial. Rocky K. C. Chang. Presented by. Adwait Belsare (. adwait@wpi.edu. ). Suvesh Pratapa (. suveshp@wpi.edu. ). Modified . . by Bob Kinicki. (. DDoS. ). Defending against Flooding-Based . DDoS. Attacks: A Tutorial. Rocky K. C. Chang. Presented by. Adwait Belsare (. adwait@wpi.edu. ). Suvesh Pratapa (. suveshp@wpi.edu. ). Modified by Bob Kinicki. (. DDoS. ). Defending against Flooding-Based . DDoS. Attacks: A Tutorial. Rocky K. C. Chang. Presented by. Adwait Belsare (. adwait@wpi.edu. ). Suvesh Pratapa (. suveshp@wpi.edu. ). Modified by Bob Kinicki.

Download Document

Here is the link to download the presentation.
"Detection of Promiscuous nodes Using Arp Packets"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents