100 likes | 131 Views
This project aims to compare security attack patterns in wired and wireless environments to identify differences and similarities. Explore total number and types of attacks, their distribution over time, and propose preventative solutions.
E N D
Security attacks in wired/wireless network Team 6 이창현, 박정아
Contents • Motivation • Project goal and Scope • Methodology • Technical problems • Expected results and Deliverable
1. Motivation • We use firewall and other programs to protect our computers from worm attacks, but do we actually know how serious it is? • Do the security attacks show different behavior in wired/wireless network?
2. Project goal and scope • To compare the patterns of security attacks in wired/wireless environments - Total number of security attacks - Percentage of each type (TCP, UDP, ICMP scanning, etc.) - Attack distribution over time • To find possible solutions to the problem
3. Methodology (1) • Choose several locations that provide both wired/wireless connections - CS building, Library, Creative learning building, etc. • Using two laptops at the same time, monitor the network traffic for one day to see which ports are scanned by attackers
3. Methodology (2) • From the log files, classify the type of security attacks and compare the results from wired/wireless network • Provide possible solutions to prevent those security attacks
4. Technical problems • Problem with location for experiment • Choosing a monitoring application to analyze log files easily
5. Expected result and deliverable • Security attacks might be prevalent in wired environment • Types of security attacks will be similar in both environment • The number of attacks in wired environment will be significantly reduced at night • Log files, analysis, project report