MITIGATING MIMICKING ATTACKS and ANTI ATTACKS
IN
CYBERSPACE NETWORKS
A PROJECT REPORT
Submitted by
V.GAYATHRI(510212104004)
J.MANIMEGALAI (510212104011)
N.SUGANTHI(510212104702)
In partial fulfilment for the award of the degree
Of
BACHELOR OF ENGINEERING
In
COMPUTER SCIENCE AND ENGINEERING
ANNAMALAIAR COLLEGE OF ENGINEERING
ANNA UNIVERSITY: CHENNAI 600 025
APRIL 2016
ANNA UNIVERSITY : CHENNAI 600 025
BONAFIDE CERTIFICATE
Certified that this project report “PRIVACY POLICY FOR
IMAGES ON CONTENT SHARING SITES”is the bonafidework of
“V.GAYATHRI(510212104004),J.MANIMEGALAI(510212104011,
and N.SUGANTHI(510212104702)”who carried out the project work
under my supervision.
SIGNATURE SIGNATURE
Ms C.K.REVATHI, M.Tech, Ms C.K.REVATHI,M.Tech,,
HEAD OF THE DEPARTMENT SUPERVISOR
Assistant Professor
Department of Computer Science and Department of Computer Science and
Engineering Engineering
Annamalaiar College of Engineering Annamalaiar College of Engineering
Modaiyur-606 902 Modaiyur-606 902
Submitted to the VIVA VOCE held on…………………..
INTERNAL EXAMINER EXTERNAL EXAMINER
ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of any work would
be incomplete without mentioning those people who made it possible, whose
constant guidance and encouragement rounded our efforts with success.
It is a great pleasure for us to acknowledge the assistance and contributions of
some people for this effort. First, we would like to thank god for giving us the
confidence and power to complete this work successfully. We would like to
thank CHAIRMANDr.K.R.ARUMUGAM, BE. F.I.E., D.Litt.
M.I.S.T.E., MA (YOGA) Founder, Annamalaiar College of
Engineering, for giving us the opportunity to complete our study and the
project well in advance.
It is my great pleasure to acknowledge the assistance and contributions of
people especially our PRINCIPALDr.R.KANNAN,M.E.,
Ph.D.,Annamalaiar College of Engineering, who got the whole thing started
and who gave us the chance to express ourselves.
I would like to express my deep gratitude and appreciation to our Project
Co-ordinator Ms C.K.REVATHI,,M.Tech.,Head of the Department,
Computer Science and Engineering, for giving details, guidelines,
stimulating suggestions and encouragement which helped me to coordinate my
project.
I take this opportunity to express my profound gratitude and deep regards to my
Supervisor,Ms C.K.REVATHI,,M.Tech.,Head of theDepartment of
Computer Science and Engineering, for her exemplary guidance, monitoring
and constant encouragement throughout the project. The blessing, help and
guidance given by her time to time shall carry me a long way in the journey of
life on which I am about to embark.
Lastly, I thank almighty, all the staff members and my parents for their
constant encouragement without which this assignment would not be possible.
ABSTRACT
Botnets have become major engines for malicious activities in cyberspace
nowadays. To sustain their botnets and disguise their malicious actions, botnet
owners are mimicking legitimate cyber behavior to fly under the radar. This
poses a critical challenge in anomaly detection. In this paper, we use web
browsing on popular websites as an example to tackle this problem. First of all,
we establish a semi-Markov model for browsing behavior. Based on this model,
we find that it is impossible to detect mimicking attacks based on statistics if the
number of active bots of the attacking botnet is sufficiently large (no less than
the number of active legitimate users). However, we also find it is hard for
botnet owners to satisfy the condition to carry out a mimicking attack most of
the time. With this new finding, we conclude that mimicking attacks can be
discriminated from genuine flash crowds using second order statistical metrics.
We define a new fine correntropy metrics and show its effectiveness compared
to others. Our real world data set experiments and simulations confirm our
theoretical claims. Furthermore, the findings can be widely applied to similar
situations in other research fields.
i
CHAPTER TITLE PAGE NO
ABSTRACT I
LIST OF FIGURES V
LIST OF ABBREVIATIONS Vi
1 INTRODUCTION 1
1.1 AIM 1
1.2 MOTIVATION 1
2 SYSTEM ANALYSIS 3
2.1 LITERATURE SURVEY 3
2.2 SYSTEM STUDY 5
2.3 EXISTING SYSTEM 6
2.3.1 DISADVANTAGES 6
2.4 PROPOSED SYSTEM 7
2.4.1 ADVANTAGES 8
3 SYSTEM SPECIFICATION 9
3.1 HARDWARE REQUIREMENTS 9
3.2 SOFTWARE REQUIREMENTS 9
4 SYSTEM DESIGN 10
4.1 SYSTEM ARCHITECTURE 10
4.2 LIST OF MODULES 12
4.3 MODULES DESCRIPTION 12
4.3.1 FAIR EXCHANGE BETWEEN 12
NODE AND BOTNETS
14
4.3.2 CYBERSPACE DATA
VERIFICATION
ii
4.3.3 MIMICKING ATTACKS 15
EVALUATED
4.3.4 NON INTERACTIVE ZERO 16
KNOWLEDGE
4.4 DATA FLOW DIAGRAM 18
4.5USE CASE DIAGRAM 21
4.6ACTIVITY DIAGRAM 22
4.7SEQUENCE DIAGRAM 24
4.8COLLABORATION DIAGRAM 26
4.9 CLASS DIAGRAM 27
5 SOFTWARE IMPLEMENTATION 28
5.1 LANGUAGE SPECIFICATION 28
5.2 SOFTWARE TESTING 39
5.2.1 UNIT TESTING 39
5.2.2 INTEGRATION TESTING 39
5.2.3 FUNCTIONAL TESTING 40
5.2.4 SYSTEM TESTING 40
5.2.5 WHITE BOX TESTING 41
5.2.6 BLACK BOX TESTING 41
6 CONCLUSION AND FUTURE 43
ENHANCEMENT
6.1 CONCLUSION 43
6.2 FUTURE ENHANCEMENT 43
iii
7 APPENDICES 44
7.1 SAMPLIND CODE 44
7.1.1 MAIN SERVER 44
7.1.2 NODE 47
7.1.2.1 DATABASE CONNECTION 47
7.1.2.2 KEY GENERATION 48
7.1.2.3 SERVER ADDRESS 49
7.2 SNAPSHOTS 50
7.2.1 MAIN SERVER 50
7.2.1.1 SERVER RUNNING 50
7.2.2 NODE 51
7.2.2.1 CYBERSPACE 51
7.2.2.2 USER 52
7.2.2.3 BOTNET 53
7.2.2.4 VERIFICATON 54
7.2.2.5 FILE REQUEST 55
7.2.2.6 BOTNET REQUEST 56
8 REFERENCES 58
vi
FIG NO FIGURES
LIST OF FIGURES PAGE NO
4.1 SYSTEM ARCHITECTURE 14
4.3.1 FAIR EXCHANGE BETWEEN 15
NODE AND BOTNET
CYBERSPACE DATA
4.3.2 16
LIST OF FIGURES
VERIFICATION
4.3.3 17
MIMICKING ATTACK
EVALUATED
4.3.4 NON INTERACTIVE ZERO 18
KNOWLEDGE
4.4.1 DFD LEVEL 0 19
4.4.2 DFD LEVEL 1 20
4.4.3 DFD LEVEL 2 20
4.5 USE CASE DIAGRAM 21
4.6 ACTIVITY DIAGRAM 22
4.7 SEQUENCE DIAGRAM 23
4.8 COLLABORATION DIAGRAM 24
4.9 CLASS DIAGRAM 25
v
LIST OF ABBREVATIONS
S.NO ABBREVIATIONS DESCRIPTION
1 NZK NON interactive ZERO
KNOWLEDGE
2 FE FAIR EXCHANGE
3 EE ELGAMEL ENCRYPTION
vi