9.chera docums donedone

download 9.chera docums donedone

of 70

Transcript of 9.chera docums donedone

  • 7/31/2019 9.chera docums donedone

    1/70

    CHAPTER 1

    INTRODUCTION

    1.1 General

    The frequent attacks on network infrastructure, using various forms of

    denial of service (DoS) attacks and worms, have led to an increased need for

    developing techniques for analyzing and monitoring network traffic. If efficient

    analysis tools were available, it could become possible to detect the attacks,

    anomalies and take action to suppress them before they have had much time to

    propagate across the network. In this paper, we study the possibilities of traffic-

    analysis based mechanisms for attack and anomaly detection. The motivation for

    this work came from a need to reduce the likelihood that an attacker may hijack the

    campus machines to stage an attack on a third party.

    A campus may want to prevent or limit misuse of its machines in staging

    attacks, and possibly limit the liability from such attacks. In particular, we study

    the utility of observing packet header data of outgoing traffic, such as destination

    addresses, port numbers and the number of flows, in order to detect

    attacks/anomalies originating from the campus at the edge of a campus. Detecting

    anomalies/attacks close to the source allows us to limit the potential damage close

    to the attacking machines. Traffic monitoring close to the source may enable the

    network operator quicker identification of potential anomalies and allow better

    control of administrative domains resources.

    Attack propagation could be slowed through early detection. Our approach

    passively monitors network traffic at regular intervals and analyzes it to find any

    abnormalities in the aggregated traffic. By observing the traffic and correlating it to

    previous states of traffic, it may be possible to see whether the current traffic is

    behaving in a similar manner.

    1

  • 7/31/2019 9.chera docums donedone

    2/70

    The network traffic could look different because of flash crowds, changing

    access patterns, infrastructure problems such as router failures, and DoS attacks. In

    the case of bandwidth attacks, the usage of network may be increased and

    abnormalities may show up in traffic volume. Flash crowds could be observed

    through sudden increase in traffic volume to a single destination. Sudden increase

    of traffic on a certain port could signify the onset of an anomaly such as worm

    propagation. Our approach relies on analyzing packet header data in order to

    provide indications of possible abnormalities in the traffic.

    2

  • 7/31/2019 9.chera docums donedone

    3/70

    CHAPTER 2

    LITERATURE REVIEW

    2.1 General

    General properties of network packet traffic have been studies intensely for

    many years - standard references include. Many different analysis techniques have

    been employed in these and other studies including wavelets in. The majority of

    these traffic analysis studies have been focused on the typical, packet level and

    end-to-end behavior (a notable exception being ). Our focus is mainly at the flow

    level and on identifying frequency characteristics of anomalous network traffic.

    There have been many prior studies of network fault detection methods. Example

    includes.

    Feather et al. use statistical deviations from normal traffic behavior to

    identify faults while a method of identifying faults by applying thresholds in time

    series models of network traffic is developed in.

    These are focus on accurate detection of deviations from normal behavior.

    Our work is focused on identifying anomalies by removing first from the signal itspredictable, ambient part, and only then employing statistical methods. Wavelet are

    used for the former task.

    Detection of black-hat activity including denial-of-service (DoS) attacks

    and port scan attacks has also been treated widely. Methods for detecting intrusions

    include clustering , neural networks and Markov models.

    3

  • 7/31/2019 9.chera docums donedone

    4/70

    2.2 Literature Survey

    Moore et al. show that flow data can be effective for identifying DoS

    attacks . A number of intrusion detection tools have been developed in recent years

    in response to the rise in black-hat activity. An example is Bro which provides an

    extensible environment for identifying intrusion and attack activity. Our work

    complements this work by providing another means for identifying a variety of

    anomalous behaviors including attacks. We identify flash crowds as an important

    anomaly category.

    The events of September 11, 2001 and the inability of most online news

    services to deal with the offered demand is the most extreme example of this kind

    of behavior. While infrastructure such as content delivery networks (CDNs) have

    been developed to mitigate the impact of flash crowds, almost no studies of their

    characteristics exist. A recent study on flash crowds is by Jung. That work

    considers flash crowds (and DoS attacks) from the perspective of Web servers logs

    whereas ours is focused on network traffic. Finally, cooperative pushback are to be

    proposed in as a means for detection and control of events such as flash crowds.

    Rule-based approaches, such as IDS (intrusion detection system), try to

    apply previously established rules against incoming traffic to detect and identify

    potential DoS attacks close to the victims network. To cope with novel attacks,

    however, IDS tools such as Snort require to be updated with the latest rules. This

    paper looks at the problem of designing generalized measurement based real-time

    detection mechanism. Measurement-based studies have considered traffic volume,

    number of flows as potential signals that can be analyzed in order to detect

    anomalies in network traffic.

    While we further treat the traffic headers such as addresses and port

    numbers.Work in relies on input data from multiple sources while our work

    focuses on a single link at a time.

    4

  • 7/31/2019 9.chera docums donedone

    5/70

    Some approaches proactively seek methods to suppress the overflow of

    traffic at the source. Controls based on rate limits have been adopted for reducing

    the monopolistic consumption of available bandwidth, to diminish the effects of

    attacks, either at the source or at the destination . The apparent symptoms of

    bandwidth attack may be sensed through monitoring bit rates and/or packet counts

    of the traffic flow. Bandwidth accounting mechanisms have been suggested to

    identify and contain attacks .

    Packeteer and others offer commercial products that can account traffic

    volume along multiple dimensions and allow policy-based rate control of

    bandwidth. Pushback mechanisms have been proposed to contain the detected

    attacks closer to the source. Trace back has been proposed to trace the source ofDDoS attacks even when the source addresses may be spoofed by the attacker .

    However, sophisticated low-rate attacks , which do not give rise to noticeable

    variance in traffic volume, could go undetected when only traffic volume is

    considered.

    Recently statistical analysis of aggregate traffic data has been studied. In

    general, the generated signal can be analyzed by employing techniques such as

    FFT (Fast Fourier Transform) and wavelet transforms. FFT of traffic arrivals may

    reveal inherent flow level information through frequency analysis. Fourier

    transforms and wavelets have been applied to network traffic to study its

    periodicity . Our previous work in and the work in studied traffic volume as a

    signal for wavelet analysis and these earlier studies have considerably motivated

    our current study.

    . A similar data structure was employed with significant differences in

    processing of collected data, detection mechanisms and the resulting traffic

    anomaly detectors. The structure of addresses at various points in the network was

    observed to be multi-fractal.

    5

  • 7/31/2019 9.chera docums donedone

    6/70

    2.3 EXISTING SYSTEM

    There is no established existing system to prevent the network traffic.And so

    we are developing the statically analysis for detecting the traffic anomalies.

    2.4 PROPOSED SYSTEM

    In this project we are going to detect the anomalies using the following three

    techniques.

    Traffic Analysis at the Source

    General mechanism of detector.

    Trace.

    Traffic Analysis at the Source

    We focus on analyzing the traffic at an egress router. Monitoring traffic at a

    source network enables early detection of attacks, to control hijacking of AD

    (administrative domain, e.g., campus) machines, and to limit the squandering of

    resources.

    There are two kinds of filtering based on traffic controlling point as shown

    in. Ingress filtering protects the flow of traffic entering into an internal network

    under administrative control. IOn the other hand, egress filtering controls the flow

    of traffic leaving the administered network.

    Thus, internal machines are typically the origin of this outbound traffic in

    view of an egress filter. As a result, the filtering is performed at the campus edge.

    Outbound filtering has been advocated for limiting the possibility of address

    spoofing with such filtering in place, we can focus on destination addresses and

    port numbers of the outgoing traffic for analysis purposes.

    6

  • 7/31/2019 9.chera docums donedone

    7/70

    General Mechanism of Detector

    The first step is a traffic parser, in which the correlation signal is generated

    from packet header traces or NetFlow records as input. The first step is a traffic

    parser, in which the correlation signal is generated from packet header traces or

    NetFlow records as input. Fields in the packet header, such as destination

    addresses and port numbers, and traffic volume depending on the nature of the

    traffic, can be used as a signal. By this way we generate the signal.

    Second step is to transform the signal using the discrete wavelet transform

    DWT. Analyzing discrete domains such as address spaces and port Numbers poses

    interesting problems for wavelet analysis. We employ the correlation in different

    domains to generate the suitable signal for analysis.Finally we use the technique of finding the attack or the anomalies. this is

    done with the help of setting the threshold . And we are comparing the result with

    the historical data .and the anomalies are detected using the statically analysis. We

    report on our results employing correlation of destination addresses, port numbers

    and the distribution of the number of flows as monitored traffic signals.

    7

  • 7/31/2019 9.chera docums donedone

    8/70

    Trace

    To verify the validity of our approach, we run our algorithm on four traces

    of network traffic. First, we examine our method on traces from the University of

    Southern California that contain real network attacks. Second, to inspect the

    performance of our detector on backbone links, we examine the mechanism on

    KREONet2 traces, which include over 230 organizations, from July 21, 2003, to

    July 28, 2003, that contain real worm attacks . In the trace employed, there were

    three major attacks and a few instantaneous probe attacks, which were judged by

    various forensic traffic analyses in advance. Third, to compare our method with

    Snort, we exploit a live network in Texas A&M University. Fourth, to evaluate the

    sensitivity of our detectors performance over attacks of various configurations, weemploy the attack-free traces from the NLANR (National Laboratory for Applied

    Network Research) , which are later superimposed with simulated virtual attacks.

    8

  • 7/31/2019 9.chera docums donedone

    9/70

    2.5 PROBLEM FORMULATION

    2.5.1 Main Objectives

    In our project we detect the traffic anomalies by monitoring the header data.

    Some attacks like denial of service led to develop the techniques for identifying the

    network traffic. If we have the efficient analysis tool we could prevent the network

    from the traffic before it could get attacked. We can analyze the network traffic

    with the help of, correlation of the destination IP address in the egress router. The

    address correlations are data transformed using the discrete wavelet transform for

    detecting the traffic anomalies. Results from trace-driven evaluation suggest that

    proposed approach could provide an effective means of detecting anomalies closeto the source. We also present a multidimensional indicator using the correlation of

    port numbers and the number of flows as a means of detecting anomalies.

    2.5.2 Modules

    Login

    Client

    Ingress router

    Egress router

    File Sending

    9

  • 7/31/2019 9.chera docums donedone

    10/70

    Login

    In this module the user are allowed to sign up as a new user. Once the user

    signs in there is a separate log maintained for the particular user. The existing user

    can sign in to perform the operation.

    Client

    The user who wants to send a file is treated as client. Before selecting a file

    to send, the client has to provide his details to the server. The client is restricted to

    choose the file which creates traffic in the network.

    Ingress RouterIngress filtering protects the flow of traffic entering into an internal network

    under administrative control. Once the user signs in to the application his details

    are stored in the server. After choosing a particular file the details of file is

    gathered in order to prevent traffic.

    Egress Router

    In this module the activities of user after choosing a file is checked. An

    separate log is created for the user. Here all the details including size and type of

    the file he chooses is stored. If he chooses the file which may create trafficthe error

    count in his account gets added.

    File Sending

    Server checks the size and type of the file chosen by the client. If the server

    finds that it may create traffic then server provide request to the client to choose

    another file. If the client tries to send the file which may create traffic for more

    than 3times, the server disconnects his connection.

    10

  • 7/31/2019 9.chera docums donedone

    11/70

    Module Input

    Client chooses a file to send providing his details to the server.

    Module Output

    If the client choose the file which creates traffic server request him to

    choose another file and increments his error count else his file is transferred.

    2.6 SYSTEM REQUIREMENTS

    2.6.1 HARDWARE REQUIREMENTS

    SYSTEM : Pentium IV 2.4 GHz

    HARD DISK : 40 GB

    FLOPPY DRIVE : 1.44 MB

    MONITOR : 15 VGA colour

    MOUSE : Logitech.

    RAM : 256 MB

    KEYBOARD : 110 keys enhanced.

    2.6.2 SOFTWARE REQUIREMENTS

    Operating system :- Windows XP Professional

    Front-End :- Microsoft Visual Studio .Net 2005

    Coding Language :- C# 2.0

    Database :- SQL SERVER 2000

    11

  • 7/31/2019 9.chera docums donedone

    12/70

    2.7 LANGUAGE SPECIFICATION

    XML and ADO.NET

    ADO.NET leverages the power of XML to provide disconnected access

    to data. ADO.NET was designed hand-in-hand with the XML classes in the .NET

    Framework both are components of a single architecture.

    ADO.NET and the XML classes in the .NET Framework converge in the

    DataSet object. The DataSet can be populated with data from an XML source,

    whether it is a file or an XML stream. The DataSet can be written as World Wide

    Web Consortium (W3C) compliant XML, including its schema as XML Schema

    definition language (XSD) schema, regardless of the source of the data in the

    DataSet. Because the native serialization format of the DataSet is XML, it is anexcellent medium for moving data between tiers making the DataSet an optimal

    choice for remoting data and schema context to and from an XML Web service.

    The DataSet can also be synchronized with an XmlDataDocument to

    provide relational and hierarchical access to data in real time.

    12

  • 7/31/2019 9.chera docums donedone

    13/70

    ADO.NET Components

    The ADO.NET components have been designed to factor data access from data

    manipulation. There are two central components of ADO.NET that accomplish

    this: the DataSet, and the .NET data provider, which is a set of components

    including the Connection, Command, DataReader, and DataAdapter objects.

    This is the core component of the disconnected architecture of

    ADO.NET. The DataSet is explicitly designed for data access independent of any

    data source. As a result it can be used with multiple and differing data sources,

    used with XML data, or used to manage data local to the application. The DataSet

    contains a collection of one or more DataTable objects made up of rows and

    columns of data, as well as primary key, foreign key, constraint, and relationinformation about the data in the DataTable objects.

    The other core element of the ADO.NET architecture is the .NET data

    providers, whose components are explicitly designed for data manipulation and

    fast, forward-only, read-only access to data. The Connection object provides

    connectivity to a data source. The Command object enables access to database

    commands to return data, modify data, run stored procedures, and send or retrieve

    parameter information. The DataReader provides a high-performance stream of

    data from the data source. Finally, the DataAdapter provides the bridge between

    the DataSet object and the data source. The DataAdapter uses Command objects to

    execute SQL commands at the data source to both load the DataSet with data, and

    reconcile changes made to the data in the DataSet back to the data source.

    You can write .NET data providers for any data source. The .NET

    Framework ships with two .NET data providers the SQL Server .NET Data

    Provider and the OLE DB .NET Data Provider. The following diagram illustrates

    the components of ADO.NET architecture the SQL Server .NET Data Provider and

    the OLE DB .NET Data Provider.

    The following diagram illustrates the components of ADO.NET architecture

    13

  • 7/31/2019 9.chera docums donedone

    14/70

    ADO.NET ARCHITECTURE

    FIG NO 1:ADO.NET ARCHITECTURE

    14

  • 7/31/2019 9.chera docums donedone

    15/70

    Remoting or Marshaling Data between Tiers and Clients

    The design of the DataSet enables you to easily transport data to

    clients over the Web using XML Web services, as well as allowing you to marshal

    data between .NET components using .NET Remoting services. You can also

    remote a strongly typed DataSet in this fashion. For an overview of XML Web

    services.

    An overview of remoting services can be found in the .NET Remoting

    Overview to note that DataTable objects can also be used with remoting services,

    but cannot be transported via an XML Web service.

    Ado.Net Platform RequirementsThe Microsoft .NET Framework SDK (including ADO.NET) is

    supported on Microsoft Windows 2000, Microsoft Windows NT 4 with Service

    Pack 6a, Microsoft Windows Millennium Edition, Microsoft Windows 98, and

    Microsoft Windows SE. Use of the SQL Server .NET Data Provider or OLE

    DB .NET Data Provider requires the installation of Microsoft Data Access

    Components version 2.6 or later.

    The following code example shows how to include the System.Data

    namespace in your applications, in order to use ADO.NET.

    15

  • 7/31/2019 9.chera docums donedone

    16/70

    SQL Server

    Microsoft and Sybase teamed up to create SQL Server. It ran only on IBMs

    OS/2 operating system platform. After release of version 6.5 Microsoft and Sybase

    separated and SQL Server made its progress into the competitive market.

    SQL Server 6.5, the earlier mainly focused on database design and

    implementation. The Latest version 7 is a significant release of SQL Server. In the

    version two major changes have been made.

    New Server architecture

    Inclusion of graphical tools likes Web Assistant Wizard,

    Data Transformation services.

    However, the new version maintains ANSI standards and 6.x compatibility.SQL Server is an SQL-compliant RDBMS. SQL-complaint means it uses the

    ANSI version of Structured Query Language (SQL). SQL is a set of commands

    that allows you to modify or retrieve information from the database. The ANSI and

    International Standards Organization have defined various standards for SQL.

    Most Modern RDBMS products have their own dialect of SQL. For example,

    Oracle has PL/SQL.

    SQL Server supports SQL-92 standards. It uses a version of SQL called

    Transact- SQL. Client/Server means that SQL Server is designed to store data in

    the central location (the server) and it can be shared on demand to numerous other

    locations (The client). SQL Sever is also a Relational Database Management

    System.

    16

  • 7/31/2019 9.chera docums donedone

    17/70

    Understanding Relational features of SQL Server

    Information Representation

    In SQL Server data is represented in terms of rows and columns of a table.

    Data Stored as a table can be easily visualized, because we encounter data stored in

    tables in everyday life. For example, train or plane schedule can be referenced as a

    table.

    Unique Definition of Rows

    The relational model requires each row to be uniquely defined by at least

    one or more columns of a table. The unique row requirement ensures that each row

    in the table can be accessed and changed independently from other rows of a table.

    It means a change made to a row in the table does not affect the other rows. In

    Unique Definition of Rows we can make each row of a table unique by using a

    feature called a constraint, which is a property that can be placed on a column or

    set of columns in a table.

    Systematic treatment of Null values

    SQL Server, like most RDBMS treats Null values Zeros and blanks

    differently. While creating a table, one can specify whether a field allows Null

    values or not.

    High Level Update, Insert and Delete

    In SQL Server if a record is updated or deleted in a master table the

    corresponding record in the other table is also updated or dropped, this process of

    ensuring that corresponding records of related tables are maintained to keep the

    relationship intact is called Referential Integrity.

    17

  • 7/31/2019 9.chera docums donedone

    18/70

    Query Fundamentals

    Once the data is entered in SQL Server database, you need to have a way

    to retrieve it, to change it, to add or insert new data or to delete existing data.

    In SQL Server, a data that is stored across tables in one or more databases can

    be combined using a query.

    Query is a request for data stored in SQL Server database. Basically, it

    is a specific demand from the user for retrieval, modification or deletion. Query is

    fired by the user and is processed by the SQL Server .These are different ways of

    accessing the information in SQL Server: Transact SQL is one of them.

    18

  • 7/31/2019 9.chera docums donedone

    19/70

    Transact-SQL Programming Language

    There are several methods of programming SQL Server applications.

    Transact-SQL is the SQL database language used by the SQL Server. Client

    applications use this language to communicate with the SQL Server. Transact-SQL

    is used to create and manipulate database objects as well as for inserting, selecting

    and updating data.

    Transact-SQL is a standard language for communication between the SQL

    Server and the application. The Transact-SQL language is an enhancement to

    Structured Query Language (SQL), the ANSI standard relational database

    language. It provides comprehensive language for defining tables, inserting,

    deleting, updating and accessing the data in the table.

    Elements of Transact-SQL

    The elements of Transact-SQL are as follows:

    Data Definition Language (DDL)

    Data Manipulation Language (DML)

    Data Control Language (DCL)

    19

  • 7/31/2019 9.chera docums donedone

    20/70

    MICROSOFT SQL SERVER TOOLS

    Enterprise Manager

    Query Analyzer

    Enterprise Manager

    SQL Server Enterprise Manager is a graphical tool that allows easy

    configuration and management of Microsoft SQL Server and SQL Server objects.

    Enterprise Manager can be found in SQL Server7 program group.

    SQL Server Enterprise Manager can also be used to:

    Manage Logins, permissions and users

    Create Database

    Take back up of database and transaction logs

    Manage Tables

    Query Analyzer

    The SQL Server Query Analyzer allows you to create adhoc queries and run

    them interactively. The Query Analyzer also has a color-coded editor to assist the

    user with checking of syntax. It also has context sensitive help.

    20

  • 7/31/2019 9.chera docums donedone

    21/70

    VB SCRIPT

    Scripting language used mostly at the client level which have the capability

    of creating dynamic web pages. The essential need of VBScript is due to the

    following requirements

    user interaction

    data validation

    client side utility

    FEATURES

    Interpreted language

    Object oriented support

    Provides procedural capabilities

    Works on event driven model

    Embedded within ML format

    Works on DOM (Document Object Model)

    21

  • 7/31/2019 9.chera docums donedone

    22/70

    ELEMENTS OF VB SCRIPT

    Variable

    Arrays

    Control statements

    Functions

    Objects

    Events

    To program with ASP.NET, VB Script is probably the most common

    language. VB Scripts only has one data type the variant data type. The variant is

    used because of its flexibility with all data types. The variant data type is unique in

    the sense that the variant actually changes behavior depending on the type of data

    it is storing. The variant uses subtypes to provide some optimization and data type

    specific functionality.

    22

  • 7/31/2019 9.chera docums donedone

    23/70

    Techniques and Algorithm Used

    There are two kinds of filtering based on traffic controlling. Ingress

    filtering protects the flow of traffic entering into an internal network under

    administrative control. We focus on analyzing the traffic at an egress router.

    Monitoring traffic at a source network enables early detection of attacks.

    Applications:

    Detecting anomalies through multiple levels will have a number of

    advantages:

    (i) by setting a high threshold at each level, anomalies can be detected withhigh confidence;

    (ii) depending on operators filtering criteria, he/she can adjust the threshold

    between accuracy and flexibility.

    (iii) the attributes of attacks.

    23

  • 7/31/2019 9.chera docums donedone

    24/70

    2.8 SYSTEM DESIGN

    Module diagram

    Fig No 2. Module Diagram

    24

    Start

    Client

    Registration and Login

    Selecting fileIngress router

    Egress routerSending file

    Stop

  • 7/31/2019 9.chera docums donedone

    25/70

    UML Diagrams

    Use case diagram

    Fig No 3 Use Case Diagram

    CLASS DIAGRAM

    25

    Server

    Registration

    Select FileClient

    Sending File

    Stores client details

    Check server activities

    Maintain the error log

    Server

    File size, File type

    Binary reader

    Ingress router

    IP address

    User name

    Client Details()

    Egress router

    Error count

    Threat()

    Repeated threat()

    Client

    Prov_id,prov_name,Add IP address

    Choose file();

    Sending file

    Client Data

    Socket,Get IP

    Server

    File size, File type

    Binary reader

    Ingress router

    IP address

    User name

    Client Details()

    Egress router

    Error count

    Threat()

    Repeated threat()

    Client

    Prov_id,prov_name,Add IP address

    Choose file();

    Sending file

    Client Data

    Socket,Get IP

  • 7/31/2019 9.chera docums donedone

    26/70

    Fig No 4 Class Diagram

    Object Diagram

    Fig no 5 Object Diagram

    State Diagram

    26

    Ingress routerClient

    Login

    Server

    Select file

    Sending file

    Regress router

    Client

    File selection

    File sending ()

    Server

    Getting IP

    Type, size

    Binding Data ()

    Egress router

    User name

    File type()File length()

    Ingress router

    Error log

    Threat()

    Repeat threat()

  • 7/31/2019 9.chera docums donedone

    27/70

    Fig no 6State Diagram

    Activity Diagram

    27

  • 7/31/2019 9.chera docums donedone

    28/70

    Fig no 7 Activity Diagram

    Sequence Diagram

    28

  • 7/31/2019 9.chera docums donedone

    29/70

    Fig no 8 Sequence Diagram

    Egress routerNew User Login Client ProvideDetail

    Sending file Ingressrouteer

    ErrorlogI

    User Info

    Login Info

    User Details

    File Details

    Check threat

    Repeated threat

    IncrementingError count

    29

  • 7/31/2019 9.chera docums donedone

    30/70

    Collaboration Diagram

    Fig no 9 Collaboration Diagram

    ClientLogin

    FileSelection

    SendingFile

    UserDetails

    Error count

    CheckingDetails

    ErrorMessage

    ReceivingFile

    1: User Info

    2: IP address

    3: Details

    4: File SizeType of file

    5: File creatingTraffic

    6: Completed Job

    30

  • 7/31/2019 9.chera docums donedone

    31/70

    Component Diagram

    Fig no 10 Component Diagram

    Client

    FilleSelection

    ClientDetails

    Server ErrorMessage

    FileDetails

    Errorcount

    31

  • 7/31/2019 9.chera docums donedone

    32/70

    32

  • 7/31/2019 9.chera docums donedone

    33/70

    Fig no 12 DATA FLOW DIAGRAM

    Transfer file

    Client

    Login

    Yes

    No

    Stop

    VerifyingAddress

    Normalfile

    File selection

    File does not

    create traffic

    Yes

    No

    Select another file

    Yes

    Display error

    message

    Maintaining error

    countNo

    33

    DATA FLOW DIAGRAM

  • 7/31/2019 9.chera docums donedone

    34/70

    Project Flow Diagram

    Fig no 13 Project Flow Diagram

    System Architecture

    Fig no 14 System Architecture

    34

    Sending file Verification

    Receiving file

    Choose fileClient

    Maintain errorcount

    Server

    Client

    IPaddress

    ClientDetails

    Login

    Server

    GuidenceReceiving

    FileChecking

    ErrorSending

    File

    Maintaing

    Error

  • 7/31/2019 9.chera docums donedone

    35/70

    2.8.1 SYSTEM DESIGN AND DEVELOPMENT

    System Design

    The most creative and challenging phase of the system development is

    system design it is a solution, a how to approach to the creation of the proposed

    system. It provides the understanding and procedural details necessary for

    implementing the system recommended in the feasibility study. Design goes

    through the logical and physical stages of development.

    At an early stage in designing in new system, the system analyst must

    have a clear understanding of the objectives which the design is aiming to fulfill.

    The first step is toe determine how the output is to be produced and in what format.

    Second input data and the files have to be designed to meet the requirements of the

    proposed output.

    The operational (processing) phases are handled though program

    construction and testing. Finally details related to justification of the system and an

    estimate of the impact of the candidate system on the user and the organization are

    documented and evaluated by management.

    The final report prior to the implementation phase includes procedural

    flow charts, records and layout and a workable plan for implementing the

    candidate system.

    35

  • 7/31/2019 9.chera docums donedone

    36/70

    Input Design

    Input design is the process of converting user oriented inputs to computer

    based format. It also includes determining the record media, method of input,

    speed of capture, and entry into the system. Consideration can be given to:

    Type of input

    Flexibility of format

    Speed

    Accuracy

    Verification methods

    Rejection rates

    Ease of correction

    Offline facilities

    Need for specialized documentation

    Storage and handling requirements

    Automatic features

    Hard copy requirements

    Security

    Ease of use

    Portability

    Compatibility with other system

    Cost etc.,

    Keyboard may be used as in input media. The data are displayed on

    cathode ray tube screen for verification. In accurate input data are the most

    common cause of errors in data processing. Errors entered by the user can be

    controlled by input design.

    In this project USER NAME, PASSWORD and etc., are given as input.

    36

  • 7/31/2019 9.chera docums donedone

    37/70

    Output Design

    The normal procedure is to design the outputs in detail first and then to

    work back to the inputs. The outputs can be in the form of operational documents,

    lengthy reports. The input records have to be validated, edited, organized and

    accepted by the system before being processed to produse the outputs. The output

    may have been defined, in terms of:

    Type of output

    Content

    Format

    Location

    Frequency

    Response

    Volume

    Sequence

    Action required

    The next stage is to determine the most appropriate medium for output

    Consideration will be:

    Suitability of the device to the particular application

    The need for hard copy

    The response time required

    The location of the user

    The software/hardware available and the cost

    37

  • 7/31/2019 9.chera docums donedone

    38/70

    Code Design

    The process of code is to facilitate the identification and retrieval of

    items of information. The code should be simple and easily understandable. The

    codes were designed in such a way that the features such as optimum human-

    oriented use and machine efficiency are unaffected.

    For the code to be designed effectively, the following characteristics

    were also considered while designing the code.

    Uniqueness

    Versatility

    Stability

    Simplicity

    Consciousness

    The code should be adequate for present and anticipated data processing for

    machine and human use. Care was taken to minimize the clerical effort andcomputer time required to continue operations.

    38

  • 7/31/2019 9.chera docums donedone

    39/70

    Database Design

    All the general activities of the application is identified in the system

    analysis stage. For the list of activities identified, the subject areas of the

    application need to maintain. Identified the activities and relationship between the

    tables primary keys were identified.

    List all the data needed to be used in the application . These data describes

    the tables. The supporting data identified becomes the names of the columns in the

    table.

    Normalization is a series of tests used against the data to eliminateredundancy and make sure the data is associated with the correct table or

    relationship. Normal forms are tests usually used to normalize data. Data

    structuring is refined through the process of normalization.

    Normalization is used to reduce data redundancy. All the tables identified in

    the system are subjected to the first normal form, second normal form and the third

    normal form.

    The data is analyzed before normalization to set the primary key of each

    table. After the normalization process the relationship between the tables were

    resolved. Relationships, like one-to-many, one-to-one must be set carefully.

    39

  • 7/31/2019 9.chera docums donedone

    40/70

    2.9 TESTING

    TESTING TECHNIQUES

    Software testing is a critical element of software quality assurance and

    represents the ultimate review of specification, design and code generation. Once

    source code has been generated, software must be tested to uncover (and correct)

    as many errors as possible before delivery to the customer.

    Software is tested from two different perspectives:

    Internal program logic is exercised using 'White Box' test case design

    techniques.

    Software requirements are exercised using 'Black Box' test case design

    techniques.

    In both cases the intention is to find the maximum number of errors with the

    minimum amount of effort and time.

    40

  • 7/31/2019 9.chera docums donedone

    41/70

    Testing Strategies

    Designing effective test cases is important, but so is the strategy you use to

    execute them. Testing is a set of activities that can be planned in advance and

    conducted systematically. For this reason a template for software testing - a set of

    steps into which we can place specific test case design techniques and testing

    methods - should be defined for the software process.

    A strategy for software testing must accommodate low-level tests that are

    necessary to verify that a small source code segment has been correctly

    implemented as well as high-level tests that validate major system functions

    against customer requirements.

    Verification and Validation

    Software testing is one element of a broader topic that is often referred to as

    Verification and Validation. Verification refers to the set of activities that ensure

    that software correctly implements a specific function. Validation refers to a

    different set of activities that ensure that the software that has been built is

    traceable to customer requirements.

    Verification:"Are we building the product right?"

    Validation: "Are we building the right product?"

    Verification and Validation encompasses a wide array of SQA (Software

    Quality Assurance) activities that include formal technical reviews, quality and

    configuration audits, performance monitoring, simulation, feasibility study,

    documentation review, database review, algorithm analysis, development testing,

    qualification testing, and installation testing.

    41

  • 7/31/2019 9.chera docums donedone

    42/70

    Software Testing Strategy

    The software engineering process may be viewed as the spiral. Initially,

    system engineering defines the role of software and leads to software requirement

    analysis, where the information domain, function, behavior, performance,

    constraints and validation criteria for software are established.

    A Strategy for software testing may also be viewed in the context of the

    spiral. Unit Testing begins at the vortex of the spiral and concentrates on each unit

    of the software as implemented in source code. Testing progresses by moving

    outward along the spiral as to Integration testing, where the focus is on design and

    the construction of the software architecture. Taking another turn outward on thespiral, we encounter validation testing, where requirements established as part of

    software requirement analysis are validated against the software that has been

    constructed. Finally, we arrive at system testing, where the software and other

    system elements are test as a whole.

    Unit Testing

    At a very lowest level is Unit Testing, where the programmer who

    writes the code testing the same as per the detailed specification. Each individual

    programs of the software were tested and the outputs obtained were found

    satisfactory.

    42

  • 7/31/2019 9.chera docums donedone

    43/70

    Integration Testing

    Top-Down integration testing is used, which is an incremental approach to

    construction of program structure. Modules are integrated by moving downward

    through the control hierarchy, beginning with the main control module. Modules

    subordinate to the main control module are incorporated into the structure in either

    a depth-first or breadth-first manner.

    Therefore in this Project we are using the Depth-First Method for testing

    and executing the Modules.

    First username and password is checked. If it is valid go to the next module

    Here Host name is checked.

    Next selecting a file and Encryption and Decryption are tested and also the

    corresponding tables are also checked.

    Validation Testing

    Validation succeeds when software functions in a manner that can be

    reasonably expected by the customer. It is done by executing the application with a

    set of inputs, for which the manual result is ready. The application's output and the

    required output is tallied with the manual one. There may be two conditions -

    performance satisfactory and accepted or deviations / deficiencies uncovered for

    which a solution is found.

    Enter Login ID and password of the registered user, and execute the Login

    Process for the same and verify the results.

    Enter the Host Name and checks whether it is true or not.

    43

  • 7/31/2019 9.chera docums donedone

    44/70

    2.9.1 SYSTEM TESTING

    Recovery Testing

    It is a system test that forces the software to fail in a variety of ways and

    verifies that recovery is properly performed.

    This application requires human intervention.

    Security Testing

    It attempts to verify that protection mechanisms built into a system will, in

    fact, protect it from improper penetration using the following measures: Using certain commands, which are not permitted and granted by the

    DBA in Oracle 9i.

    Using a wrong User Name or a Password will not allow the user to login

    to that particular page.

    Trying to edit the entries where permission is not granted.

    Performance Testing

    It is designed to test the run-time performance of software within the

    context of an integrated system In addition the following test strategies are also

    carried out during the test period.

    44

  • 7/31/2019 9.chera docums donedone

    45/70

    Application Function Test

    The functionality of Client Application is tested using the methods of

    Software testing strategies, Unit testing, Validation testing and Integration testing.

    Server Test: The coordination and Data Management Function of the Server are

    tested. Server performance i.e. overall response time and data throughput is also

    considered.

    Database Test

    The accuracy and integrity of data stored by the server is tested.

    Transactions posted by clients application are examined to ensure that data areproperly stored, updated and retrieved.

    Transaction Testing

    A series of test are made to ensure that each class of transaction is processed

    according to the requirements.

    Acceptance Testing

    When the user finds no major problems with its accuracy, the system passes

    through a final acceptance test. This confirms that the system meets the original

    goals, objectives and requirements established during analysis. The responsibilities

    for acceptance test falls on the shoulders of the users and management. If the

    system fulfills all requirements, it is finally acceptable and ready for operation.

    45

  • 7/31/2019 9.chera docums donedone

    46/70

    2.10 IMPLEMENTATION

    System Implementation is the process of converting a new

    record design in to an operational one. It is the key stage in achieving a successful

    new system because usually it involves a lot of uphill in the user. It involves user

    training, system testing and successful running of the new system Apart from

    planning; the two major tasks of preparing for implementation are educational

    training of users and testing of the system.

    Implementation Procedures

    The procedures of implementation includes Testing

    Training

    Installation

    Changeover

    Testing: Software testing is a critical element of software quality assurance andrepresent the ultimate reviews of the requirement specification, design and coding.

    Before the system turns out into a tangible implementation from an abstract

    concept, it is to be thoroughly tested and verified. Testing is the phase where the

    errors in study, design and coding is identified. Testing uncovers the problems that

    are left unsolved by the system. It also proves user acceptance and attitude of users

    towards the developed software.

    46

  • 7/31/2019 9.chera docums donedone

    47/70

    CHAPTER 3

    CONCLUSION AND FUTURE ENHANCEMENT

    In this Project the feasibility of analyzing packet header

    data through wavelet analysis for detecting traffic anomalies.

    Specifically, and the proposed use of correlation of destination IP

    addresses, port numbers and the number of flows in the outgoing

    traffic at an egress router. Our results show that statistical

    analysis of aggregate traffic header data may provide an effective

    mechanism for the detection of anomalies within a campus

    oredge network.

    FUTURE ENHANCEMENT

    In this effectiveness of our approach in postmortem and real-

    time analysis of network traffic. The results of our analysis are

    encouraging and point to a number of interesting directions for

    future research.

    47

  • 7/31/2019 9.chera docums donedone

    48/70

    APPENDICES

    APPENDIX 1: SAMPLE CODING

    server

    using System;

    using System.Collections.Generic;

    using System.ComponentModel;

    using System.Data;

    using System.Drawing;

    using System.Text;

    using System.Windows.Forms;

    using System.Data.SqlClient;

    namespace trafficServer

    {

    publicpartialclasslogin : Form

    {

    SqlCommand cmd;

    SqlDataReaderdr; SqlConnection cn;

    publicstaticString m;

    public login()

    {

    48

  • 7/31/2019 9.chera docums donedone

    49/70

    InitializeComponent();

    }

    privatevoid btnLog_Click(object sender, EventArgs e)

    {

    m = "" + textBox1.Text + "";

    Recieve rec = newRecieve();

    rec.Show();

    }

    privatevoid button1_Click(object sender, EventArgs e)

    { if((txtUser.Text != "") && (txtPass.Text != ""))

    {

    cn = new SqlConnection("server=.;initial

    catalog=Yokesh;uid=sa;pwd=;");

    cn.Open();

    cmd = newSqlCommand("Select * from login1 where username='" +

    txtUser.Text + "' AND pass='" + txtPass.Text + "'", cn);

    dr = cmd.ExecuteReader();

    dr.Read();

    if(dr.HasRows)

    {

    //groupBox1.Visible = false;

    groupBox2.Visible = true;

    button1.Enabled = false;

    btnCancel.Enabled = false;

    txtUser.Text = "";

    txtPass.Text = "";

    49

  • 7/31/2019 9.chera docums donedone

    50/70

    }

    else

    {

    lblError.Text = "";

    lblError.Text = "Username or Password Incorrect";

    }

    } else

    {

    lblError.Text = "User Name or Password cannot be blank";

    }

    }

    privatevoid btnServerPath_Click(object sender, EventArgs e)

    {

    rdoDefault.Checked = false;

    FolderBrowserDialog fd = newFolderBrowserDialog();

    if(fd.ShowDialog() == DialogResult.OK)

    {

    Server.receivedPath = fd.SelectedPath;

    }

    txtFilePath.Text= Server.receivedPath;

    }

    50

  • 7/31/2019 9.chera docums donedone

    51/70

    Client

    publicvoid btnLogin_Click(object sender, EventArgs e)

    {

    cn = newSqlConnection("server=.;initial catalog=Yokesh;uid=sa;pwd=;");

    cn.Open();

    string server = "" + txtUname.Text + ".txt";

    Servername = "" + textBox1.Text + "";

    string path3 = "\\\\" + Servername + "/DOTNET/" + server + ""; if(System.IO.File.Exists(path3))

    {

    lblError1.Text = "";

    lblError1.Text = "Contact Admin To use the tool";

    txtUname.Text = "";

    txtPass.Text = "";

    }

    else

    {

    fileName = "uname.txt";

    Servername = "" + textBox1.Text + "";

    path = "\\\\" + Servername + "/DOTNET/" + fileName + "";

    // path = "\\\\" + Servername + "/DOT NET/" + server + "";

    FileStream fileStr = newFileStream(path, FileMode.Create,

    FileAccess.Write);

    51

  • 7/31/2019 9.chera docums donedone

    52/70

    StreamWritersw = newStreamWriter(fileStr);

    sw.Write(txtUname.Text);

    sw.Close();

    fileStr.Close();

    //groupBox1.Visible = false;

    sendFile objsendfile = newsendFile();

    objsendfile.Show();

    //this.Hide();

    }

    privatevoid button1_Click(object sender, EventArgs e)

    {cn = newSqlConnection("server=.;initial catalog=Yokesh;uid=sa;pwd=;");

    cn.Open();

    if((txtUname.Text != "") && (txtPass.Text != ""))

    {

    cmd = newSqlCommand("Select * from login where username='" +

    txtUname.Text + "' AND pass='" + txtPass.Text + "'", cn);

    dr = cmd.ExecuteReader();

    dr.Read();

    if(dr.HasRows)

    {

    groupBox2.Visible = true;

    txtUname.Text = "";

    txtPass.Text = "";

    button1.Enabled = false;

    }

    52

  • 7/31/2019 9.chera docums donedone

    53/70

    Codes:

    Server

    using System;

    using System.Collections.Generic;

    using System.ComponentModel;

    using System.Data;

    using System.Drawing;

    using System.Text;using System.Windows.Forms;

    using System.Data.SqlClient;

    namespace trafficServer

    {

    publicpartialclasslogin : Form

    {

    SqlCommand cmd;

    SqlDataReaderdr;

    SqlConnection cn;

    publicstaticString m;

    public login()

    {

    InitializeComponent();

    }

    privatevoid btnLog_Click(object sender, EventArgs e)

    {

    m = "" + textBox1.Text + "";

    53

  • 7/31/2019 9.chera docums donedone

    54/70

    Recieve rec = newRecieve();

    rec.Show();

    }

    privatevoid button1_Click(object sender, EventArgs e)

    {

    if((txtUser.Text != "") && (txtPass.Text != ""))

    {

    cn = new SqlConnection("server=.;initial

    catalog=Yokesh;uid=sa;pwd=;");

    cn.Open();

    cmd = newSqlCommand("Select * from login1 where username='" +txtUser.Text + "' AND pass='" + txtPass.Text + "'", cn);

    dr = cmd.ExecuteReader();

    dr.Read();

    if(dr.HasRows)

    {

    //groupBox1.Visible = false;

    groupBox2.Visible = true;

    button1.Enabled = false;

    btnCancel.Enabled = false;

    txtUser.Text = "";

    txtPass.Text = "";

    }

    else

    {

    lblError.Text = "";

    lblError.Text = "Username or Password Incorrect";

    }

    54

  • 7/31/2019 9.chera docums donedone

    55/70

    }

    else

    {

    lblError.Text = "User Name or Password cannot be blank";

    }

    }

    privatevoid btnServerPath_Click(object sender, EventArgs e)

    {

    rdoDefault.Checked = false; FolderBrowserDialog fd = newFolderBrowserDialog();

    if(fd.ShowDialog() == DialogResult.OK)

    {

    Server.receivedPath = fd.SelectedPath;

    }

    txtFilePath.Text= Server.receivedPath;

    }

    Client

    publicvoid btnLogin_Click(object sender, EventArgs e)

    {

    cn = newSqlConnection("server=.;initial catalog=Yokesh;uid=sa;pwd=;");

    cn.Open();

    string server = "" + txtUname.Text + ".txt";

    Servername = "" + textBox1.Text + "";

    55

  • 7/31/2019 9.chera docums donedone

    56/70

    string path3 = "\\\\" + Servername + "/DOTNET/" + server + "";

    if(System.IO.File.Exists(path3))

    {

    lblError1.Text = "";

    lblError1.Text = "Contact Admin To use the tool";

    txtUname.Text = "";

    txtPass.Text = "";

    }

    else

    {fileName = "uname.txt";

    Servername = "" + textBox1.Text + "";

    path = "\\\\" + Servername + "/DOTNET/" + fileName + "";

    // path = "\\\\" + Servername + "/DOT NET/" + server + "";

    FileStream fileStr = newFileStream(path, FileMode.Create,

    FileAccess.Write);

    StreamWritersw = newStreamWriter(fileStr);

    sw.Write(txtUname.Text);

    sw.Close();

    fileStr.Close();

    //groupBox1.Visible = false;

    sendFile objsendfile = newsendFile();

    objsendfile.Show();

    //this.Hide();

    }

    privatevoid button1_Click(object sender, EventArgs e)

    {

    56

  • 7/31/2019 9.chera docums donedone

    57/70

    cn = newSqlConnection("server=.;initial catalog=Yokesh;uid=sa;pwd=;");

    cn.Open();

    if((txtUname.Text != "") && (txtPass.Text != ""))

    {

    cmd = newSqlCommand("Select * from login where username='" +

    txtUname.Text + "' AND pass='" + txtPass.Text + "'", cn);

    dr = cmd.ExecuteReader();

    dr.Read();

    if(dr.HasRows)

    {

    groupBox2.Visible = true;txtUname.Text = "";

    txtPass.Text = "";

    button1.Enabled = false;

    }

    else

    {

    lblError1.Text = "";

    lblError1.Text = "Username or Password Incorrect";

    }

    }

    else

    {

    lblError1.Text = "User Name or Password cannot be blank";

    }

    using System;

    using System.Collections.Generic;

    using System.Windows.Forms;

    57

  • 7/31/2019 9.chera docums donedone

    58/70

    namespace trafficClient

    {

    staticclassProgram

    {

    [STAThread]

    staticvoid Main()

    {

    Application.EnableVisualStyles();

    Application.SetCompatibleTextRenderingDefault(false);

    Application.Run(newlogin());

    }}

    }

    using System;

    using System.Collections.Generic;

    using System.ComponentModel;

    using System.Data;

    using System.Drawing;

    using System.Text;

    using System.Windows.Forms;

    using System.Net;

    using System.IO;

    namespace trafficClient

    {

    publicpartialclassCheckServer: Form

    {

    58

  • 7/31/2019 9.chera docums donedone

    59/70

    publicstring Server = "";

    publicString Filename = login.fileName;

    publicString Servername = login.Servername;

    public CheckServer()

    {

    InitializeComponent();

    }

    privatevoid CheckServer_Load(object sender, EventArgs e)

    {}

    privatevoid btnServer_Click(object sender, EventArgs e)

    { if(System.IO.File.Exists(path))

    {

    StreamReadersr = newStreamReader(path);

    Server = sr.ReadLine();

    MessageBox.Show("Server Connected");

    lblIP.Text = Server;

    sendFile sf = newsendFile();

    sf.Show();

    this.Close();

    }

    else

    {

    MessageBox.Show( "Server is not connected Contact Admin");

    sendFile sf = newsendFile();

    sf.btnSend.Enabled = false;

    sf.Show();

    this.Close();

    59

  • 7/31/2019 9.chera docums donedone

    60/70

    }

    }

    }

    namespace trafficClient

    {

    partialclasssendFile

    {

    private System.ComponentModel.IContainercomponents = null;

    protectedoverridevoid Dispose(bool disposing)

    {

    if(disposing && (components != null)){

    components.Dispose();

    }

    base.Dispose(disposing);

    }

    #region Windows Form Designer generated code

    privatevoid InitializeComponent()

    {

    this.lblError = new System.Windows.Forms.Label();

    this.lblS = new System.Windows.Forms.Label();

    this.lblf = new System.Windows.Forms.Label();

    this.btnSend = new System.Windows.Forms.Button();

    this.btnOpen = new System.Windows.Forms.Button();

    this.txtFilename = new System.Windows.Forms.TextBox();

    this.lblFilesize = new System.Windows.Forms.Label();

    this.btnAvail = new System.Windows.Forms.Button();

    this.groupBox1 = new System.Windows.Forms.GroupBox();

    60

  • 7/31/2019 9.chera docums donedone

    61/70

    this.label1 = new System.Windows.Forms.Label();

    this.groupBox1.SuspendLayout();

    this.SuspendLayout();

    this.lblError.AutoSize = true;

    this.lblError.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.lblError.ForeColor = System.Drawing.Color.Maroon;

    this.lblError.Location = new System.Drawing.Point(99, 221);

    this.lblError.Margin = new System.Windows.Forms.Padding(4, 0, 4, 0);

    this.lblError.Name = "lblError"; this.lblError.Size = new System.Drawing.Size(0, 21);

    this.lblError.TabIndex = 14;

    this.lblS.AutoSize = true;

    this.lblS.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.lblS.ForeColor = System.Drawing.Color.Red;

    this.lblS.Location = new System.Drawing.Point(85, 177);

    this.lblS.Margin = new System.Windows.Forms.Padding(4, 0, 4, 0);

    this.lblS.Name = "lblS";

    this.lblS.Size = new System.Drawing.Size(84, 21);

    this.lblS.TabIndex = 12;

    this.lblf.AutoSize = true;

    this.lblf.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.lblf.ForeColor = System.Drawing.Color.Red;

    61

  • 7/31/2019 9.chera docums donedone

    62/70

    this.lblf.Location = new System.Drawing.Point(88, 91);

    this.lblf.Margin = new System.Windows.Forms.Padding(4, 0, 4, 0);

    this.lblf.Name = "lblf";

    this.lblf.Size = new System.Drawing.Size(101, 21);

    this.lblf.TabIndex = 10;

    this.lblf.Text = "Flie Name:";

    this.btnSend.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.btnSend.ForeColor = System.Drawing.Color.Maroon;

    this.btnSend.Location = new System.Drawing.Point(734, 286); this.btnSend.Margin = new System.Windows.Forms.Padding(4);

    this.btnSend.Name = "btnSend";

    this.btnSend.Size = new System.Drawing.Size(124, 32);

    this.btnSend.TabIndex = 3;

    this.btnSend.Text = "Send";

    this.btnSend.UseVisualStyleBackColor = true;

    this.btnSend.Click += new System.EventHandler(this.btnSend_Click);

    this.btnOpen.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.btnOpen.ForeColor = System.Drawing.Color.Maroon;

    this.btnOpen.Location = new System.Drawing.Point(759, 80);

    this.btnOpen.Margin = new System.Windows.Forms.Padding(4);

    this.btnOpen.Name = "btnOpen";

    this.btnOpen.Size = new System.Drawing.Size(124, 32);

    this.btnOpen.TabIndex = 1;

    this.btnOpen.Text = "Open File";

    62

  • 7/31/2019 9.chera docums donedone

    63/70

    this.btnOpen.UseVisualStyleBackColor = true;

    this.btnOpen.Click += new System.EventHandler(this.btnOpen_Click);

    this.txtFilename.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.txtFilename.ForeColor = System.Drawing.Color.Maroon;

    this.txtFilename.Location = new System.Drawing.Point(244, 77);

    this.txtFilename.Margin = new System.Windows.Forms.Padding(4);

    this.txtFilename.Name = "txtFilename";

    this.txtFilename.Size = new System.Drawing.Size(465, 33);

    this.txtFilename.TabIndex = 2; this.lblFilesize.AutoSize = true;

    this.lblFilesize.Font = new System.Drawing.Font("Forte", 14.25F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.lblFilesize.ForeColor = System.Drawing.Color.Maroon;

    this.lblFilesize.Location = new System.Drawing.Point(237, 177);

    this.lblFilesize.Margin = new System.Windows.Forms.Padding(4, 0, 4, 0);

    this.btnAvail.ForeColor = System.Drawing.Color.Maroon;

    this.btnAvail.Location = new System.Drawing.Point(164, 286);

    this.btnAvail.Margin = new System.Windows.Forms.Padding(4);

    this.btnAvail.Name = "btnAvail";

    this.btnAvail.Size = new System.Drawing.Size(228, 32);

    this.btnAvail.TabIndex = 0;

    this.btnAvail.Text = "Check Availability";

    this.btnAvail.UseVisualStyleBackColor = true;

    this.btnAvail.Click += new System.EventHandler(this.btnAvail_Click);

    this.groupBox1.Controls.Add(this.txtFilename);

    63

  • 7/31/2019 9.chera docums donedone

    64/70

    this.groupBox1.Controls.Add(this.btnAvail);

    this.groupBox1.Controls.Add(this.btnOpen);

    this.groupBox1.Controls.Add(this.btnSend);

    this.groupBox1.Controls.Add(this.lblError);

    this.groupBox1.Controls.Add(this.lblf);

    this.groupBox1.Controls.Add(this.lblFilesize);

    this.groupBox1.Controls.Add(this.lblS);

    this.groupBox1.Location = new System.Drawing.Point(30, 100);

    this.groupBox1.Name = "groupBox1";

    this.groupBox1.Size = new System.Drawing.Size(1027, 448);

    this.groupBox1.TabIndex = 15; this.groupBox1.TabStop = false;

    this.label1.AutoSize = true;

    this.label1.Font = new System.Drawing.Font("Forte", 24F,

    System.Drawing.FontStyle.Italic, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.label1.ForeColor = System.Drawing.Color.Red;

    this.label1.Location = new System.Drawing.Point(230, 32);

    this.label1.Name = "label1";

    this.label1.Size = new System.Drawing.Size(269, 35);

    this.label1.TabIndex = 16;

    this.label1.Text = "Send File To Server";

    this.Controls.Add(this.label1);

    this.Controls.Add(this.groupBox1);

    this.Font = new System.Drawing.Font("Palatino Linotype", 9.75F,

    System.Drawing.FontStyle.Regular, System.Drawing.GraphicsUnit.Point, ((byte)

    (0)));

    this.Margin = new System.Windows.Forms.Padding(4);

    64

  • 7/31/2019 9.chera docums donedone

    65/70

    this.Name = "sendFile";

    this.Text = "sendFile";

    System.Windows.Forms.FormClosedEventHandler(this.sendFile_FormClosed);

    this.Load += new System.EventHandler(this.sendFile_Load);

    this.groupBox1.ResumeLayout(false);

    this.groupBox1.PerformLayout();

    this.ResumeLayout(false);

    this.PerformLayout();

    }

    #endregion

    private System.Windows.Forms.Label lblError; private System.Windows.Forms.Label lblS;

    private System.Windows.Forms.Label lblf;

    private System.Windows.Forms.Button btnOpen;

    private System.Windows.Forms.TextBox txtFilename;

    private System.Windows.Forms.Label lblFilesize;

    private System.Windows.Forms.Button btnAvail;

    private System.Windows.Forms.GroupBox groupBox1;

    private System.Windows.Forms.Label label1;

    public System.Windows.Forms.Button btnSend;

    }

    }

    65

  • 7/31/2019 9.chera docums donedone

    66/70

    APPENDIX: 2 SCREEN SHOTS

    66

  • 7/31/2019 9.chera docums donedone

    67/70

    67

  • 7/31/2019 9.chera docums donedone

    68/70

    68

  • 7/31/2019 9.chera docums donedone

    69/70

    69

  • 7/31/2019 9.chera docums donedone

    70/70

    REFERENCES

    1. A. Ramanathan, WADeS: A tool for distributed denial of service attack

    detection M.S. thesis, TAMU-ECE-2002-02, Aug. 2002.

    2. NLANR measurement and operations analysis team, NLANR Network

    Traffic Packet Header Traces, Aug. 2002

    3. J. Mirkovic, G. Prier, and P. Reiher, Attacking DDoS at the source,

    inIEEE Int. Conf. Network Protocols, Nov. 2002.

    4. CERT Advisory CA-2003-04 MS-SQL Server Worm, CERT

    Coordination Ctr.(CERT/CC),Jan 2003

    5. Packeteer, PacketShaper Express, white paper, 2003

    6. KREONet2 (Korea Research Environment Open NETwork2).

    7. Garg and A. L. N. Reddy, Mitigation of DoS attacks through QoS

    regulation, inProc. IWQOS, May 2002

    Sites Referred:

    1. http://www.pma.nlanr.net/Traces/2. http://www.cert.org/advisories/CA-2003-04.html

    3. http://www.packeteer.com/resources/prod-sol/ Xpress_Whitepaper.pdf.

    4. http://www.kreonet2.net

    http://www.pma.nlanr.net/Traces/http://www.cert.org/advisories/CA-2003-04.htmlhttp://www.kreonet2.net/http://www.pma.nlanr.net/Traces/http://www.cert.org/advisories/CA-2003-04.htmlhttp://www.kreonet2.net/