Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
detecting malicious packet losses
Post: #1

I am shanthi,studying M.E (CSE)......I am in need of the source code for "detecting malicious packet losses".......I request you to kindly send this....It will be very helpful to me....I am awaiting for your response.
Thanking You
Yours Sincerely
Post: #2
Hello everyone this Madhu doing MCA. If anybody has Detecting malicious packet losses project coding kindly send me. This is my Mail id madhunallaveni[at] contact no: 09790106306 i will be waiting for your response
with regards,
Post: #3
visit these threads for more details on this topic:
Post: #4
Done by:
S .Sujatha

Cause of Packet Loss

-Packet loss can be caused by a number of factors.
-signal degradation over the network medium.
-corrupted packets rejected in-transit.
-faulty networking hardware.
-faulty network drivers.
Post: #5

Alper T. Mzrak, Student Member, IEEE, Stefan Savage, Member, IEEE, and
Keith Marzullo, Member, IEEE

In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. We have designed, developed, and implemented a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.

THE Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of connecting to the Internet and even well-protected hosts may be crippled with denial-of-service (DoS) attacks. However, while such threats to host systems are widely understood, it is less well appreciated that the network infrastructure itself is subject to constant attack as well. Indeed, through combinations of social engineering and weak passwords, attackers have seized control over thousands of Internet routers. Even more troubling is Mike Lynn’s controversial presentation at the 2005 Black Hat Briefings, which demonstrated how Cisco routers can be compromised via simple software vulnerabilities. Once a router has been compromised in such a fashion, an attacker may interpose on the traffic stream and manipulate it maliciously to attack others—selectively dropping, modifying, or rerouting packets.
Several researchers have developed distributed protocols to detect such traffic manipulations, typically by validating that traffic transmitted by one router is received unmodified by another. However, all of these schemes—including our own—struggle in interpreting the absence of traffic. While a packet that has been modified in transit represents clear evidence of tampering, a missing packet is inherently ambiguous: it may have been explicitly blocked by a compromised router or it may
have been dropped benignly due to network congestion. In fact, modern routers routinely drop packets due to bursts in traffic that exceed their buffering capacities, and the widely used Transmission Control Protocol (TCP) is designed to cause such losses as part of its normal congestion control behavior. Thus, existing traffic validation systems must inevitably produce false positives for benign events and/or produce false negatives by failing to report real malicious packet dropping.
In this paper, we develop a compromised router detection protocol that dynamically infers the precise number of congestive packet losses that will occur. Once the congestion ambiguity is removed, subsequent packet losses can be safely attributed to malicious actions. We believe our protocol is the first to automatically predict congestion in a systematic manner and that it is necessary for making any such network fault detection practical. In the remainder of this paper, we briefly survey the related background material, evaluate options for inferring congestion, and then present the assumptions, specification, and a formal description of a protocol that achieves these goals. We have evaluated our protocol in a small experimental network and demonstrate that it is capable of accurately resolving extremely small and fine-grained attacks.

for more details, please visit

Post: #6
Thumbs Up 
hi i want more information about detecting ma;licious packet losses

Post: #7
hi! i want the more information of it's project - detecting malicious packet losses.
Post: #8
i want more information about the detecting malicious packet losses
Post: #9
to get information about the topic detecting malicious packet losses full report ppt, and related topics refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: a model based approach to evaluation of the efficacy of fec coding in combating network packet losses, theory for seperation of losses in dc machine, data flow diagram of detecting malicious packet losses, code for detecting malicious nodes in matlab, detecting malicious packet loss uml diagrams, what are the advantages of seperation of losses in dc machine, brain study financil losses pdf,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  solar power remote control bomb detecting robot pinkyshar 4 3,405 24-07-2013 02:51 PM
Bug Detecting malicious packet losses ravidanny23 1 497 30-03-2013 10:35 AM
Last Post: computer topic
  Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates deepu1331 3 1,621 31-01-2013 03:33 PM
Last Post: itnagraja
  detecting malicious packet losses mahadev 12 6,542 01-12-2012 01:39 PM
Last Post: seminar details
Sad Detecting adverse Drug Reactions Guest 0 326 14-03-2012 08:40 AM
Last Post: Guest
  detecting malicious packet loss anusuya89 11 7,555 08-03-2012 03:22 PM
Last Post: misssita
Video a new tcp pr persistence with packet reordering vasu236 1 683 01-03-2012 02:53 PM
Last Post: seminar paper
  controlling ip spoofing through inter domain packet filters haree143 4 3,015 29-02-2012 12:51 PM
Last Post: seminar paper
Last Post: seminar paper
Last Post: seminar paper