Final Part I
Final Part I
CERTIFICATE
partial fulfillment of the requirement for the award of the degree of MASTER OF
carried out by him under our guidance and supervision from August 2009 to July 2010.
The results present in this dissertation have been verified and are found to be satisfactory.
The results embodied in this dissertation have not been submitted to any other University for
DIRECTOR
Dr. L.V.A.R.Sarma
School of Information Technology,
Jawaharlal Nehru Technological University Hyderabad,
Kukatpally, Hyderabad.
ii
Date:
CERTIFICATE
This is to certify that the Dissertation entitled “PREVENTING DENIAL OF
08034D0501) in partial fulfillment of the requirement for the award of the degree of
bonafide work carried out by him under our guidance and supervision from August 2009 to
July 2010.
The results present in this dissertation have been verified and are found to be
satisfactory. The results embodied in this dissertation have not been submitted to any
ACKNOWLEDGEMENT
I reckon to a distant pleasure to endorse out indebtedness and deep sense of gratitude
Professor, School of IT, JNTUH, for her patience and cheerful readiness to help in my
project. I thank her for all the support, encouragement, and suggestions she has given during
the course of the project which made us to see the silver line in every dark cloud.
Hyderabad for his valuable suggestions and guidance in making this project successful.
Associate Professor,SIT for his cooperation and encouragement in all endeavors, who boosted
I also extend my thanks to all the staff and faculty of School of IT, JNTUH for their
cooperation during the course of the project work. My profound thanks for their help in
Finally I would like to express our sincere thanks to each and everyone of my college,
who have contributed their help and guidance for successful completion of this project.
Project Associate,
N.V.Krishna Rao,
Roll no: 08034D0501.
iv
ABSTRACT
This Project explores mechanisms for defending against Denial of Service (DoS)
attacks, have become one of the major threats to the operation of the Internet today. It
proposes a scheme for detecting and preventing the most harmful and difficult to detect DoS
Attacks those that use IP address spoofing to disguise the attack flow.
The scheme is based on a firewall that can distinguish the attack packets (containing
spoofed source addresses) from the packets sent by legitimate users, and thus filters out most
of the attack packets before they reach the victim. The scheme allows the firewall system to
configure itself based on the normal traffic of a Web server, so that the occurrence of an
attack can be quickly and precisely detected. The MDAF scheme employs a firewall at each
of the perimeter routers of the network to be protected and the firewall scans the marking
On employing this marking scheme, when a packet arrives at its destination, its
marking depends only on the path it has traversed. If the source IP address of a packet is
spoofed, this packet must have a marking that is different from that of a genuine packet
coming from the same address. The spoofed packets can thus be easily identified and dropped
by the filter, while the legitimate packets containing the correct markings are accepted.
MDAF Scheme:
Marking Scheme:
The mark made by a router would be a function of its IP address. To fit the 32-bit IP
address A of a router into the ID field, scheme employ a hash function h that converts A to a
16-bit value. This scheme adopt the CRC-16 hash function which is easy to compute and has
v
low collision rate. Since attackers can easily know the routers’ IP addresses, they can spoof
the marking on a packet if they know the hash function used by each router.
To avoid such spoofing of the marking, each router R uses a 16-bit key KR (which
is a random number chosen by the router) when computing its marking. The marking for a
router R is calculated as MR = h(A) XOR KR, where A is the IP address of the router. After
receiving a packet the router computes the marking M = MR XOR Mold, if an old marking
Filtering Scheme:
1) If the (IP-address, Marking) pair is same with one of the records in the Filter Table, the
packet is received.
2) If the source IP address of the packet exists in the Filter Table, but the marking does not
match, this packet is considered to be a spoofed packet and is dropped. TMC is incremented.
3) If the source IP address does not appear in the Filter Table, then this packet is accepted
5) All echo reply messages that are received as responses to the firewall’s requests are
handled by the Check List verification process. They are not passed through the filter.
vi
INDEX
CERTIFICATES i
ACKNOWLEDGMENT iii
ABSTRACT iv
1. INTRODUCTION 1
2. LITERATURE SURVEY 3
3.1.1. Specifications 19
3.2.3. Tables 35
vii
4. IMPLEMENATATION 38
5. TESTING 53
6. SCREENS 56
7. CONCLUSIONS 89
8. FUTURE ENHANCEMENTS 90
9. BIBLIOGRAPHY 91
10. APPENDICES 92
viii
LIST OF FIGURES
LIST OF TABLES