Vous êtes sur la page 1sur 17

1.

INTRODUCTION
1.1 ABOUT THE PROJECT
Networks are protected using many firewalls and encryption softwares. But many of them are not sufficient and effective. Most intrusion detection systems for wireless ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish. The ultimate goal of the security solutions for wireless networks is to provide security services, such as authentication, confidentiality, integrity, and anonymity to wireless users. This paper incorporates agents and data mining techniques to prevent anomaly intrusion in wireless adhoc networks. Home agents present in each system collects the data from its own system and using data mining techniques to observed the local anomalies. The Mobile agents monitoring the neighboring nodes and collect the information from neighboring home agents to determine the correlation among the observed anomalous patterns before it will send the data. This system was able to stop all of the successful attacks in an adhoc networks and reduce the false alarm positives.

1.2 ABOUT THE ORGANIZATION


Web Lite Soft Tech started on September 8
th

2012. It is a professionally

managed IT firm with operations in Coimbatore. The organization provides IT services by leveraging the combined strength of advanced technologies as well as the expertise of a team of talented software engineers and business analysts with integrity and passion as its core competency. It employs innovative methods and techniques to develop the right solutions that match unique business requirements. The globally accepted standards and methodologies follow in every stage of software development process make our solutions reliable, efficient and cost effective. SERVICES: Software Development Web Development Mobile Application Development Internet Marketing

1.3 HARDWARE SPECIFICATION


Processer Hard Disk Monitor Mouse, Keyboard RAM : : : : : Pentium IV 2.4 GHz. 40 GB. 15 VGA Colour. Standard Keyboard, Mouse 1 GB.

1.4 SOFTWARE SPECIFICATION


Operating system Coding Language : : Windows XP Professional. Java.

The Java Language


Java is two things: a programming language and a platform.

The Java Programming Language


Java is a high-level programming language that is all of the following: Simple Object-oriented Distributed Interpreted Robust Secure Architecture-neutral Portable High-performance Multithreaded Dynamic

Java is also unusual in that each Java program is both compiled and interpreted. With a compiler, you translate a Java program into an intermediate language called Java byte codes--the platform-independent codes interpreted by the Java interpreter. With an interpreter, each Java byte code instruction is parsed and run on the computer. Compilation happens just once; interpretation occurs each time the program is executed. Java byte codes can be considered as the machine code instructions for the Java Virtual Machine (Java VM). Every Java interpreter, whether it's a Java development tool or a Web browser that can run Java applets, is an implementation of the Java VM. The Java VM can also be implemented in hardware. Java byte codes help make "write once, run anywhere" possible. The Java program can be compiled into byte codes on any platform that has a Java compiler. The byte codes can then be run on any implementation of the Java VM. For example, the same Java program can run on Windows NT, Solaris, and Macintosh. 4

The Java Platform


A platform is the hardware or software environment in which a program runs. The Java platform differs from most other platforms in that it's a software-only platform that runs on top of other, hardware-based platforms. Most other platforms are described as a combination of hardware and operating system. The Java platform has two components:

The Java Virtual Machine (Java VM) The Java Application Programming Interface (Java API) The Java API is a large collection of ready-made software components that

provide many useful capabilities, such as graphical user interface (GUI) widgets. The Java API is grouped into libraries (packages) of related components. As a platform-independent environment, Java can be a bit slower than native code. However, smart compilers, well-tuned interpreters, and just-in-time byte code compilers can bring Java's performance close to that of native code without threatening portability. Java is a general-purpose, high-level programming language and a powerful software platform. Using the generous Java API, we can write many types of programs. The most common types of programs are probably applets and applications, where a Java application is a standalone program that runs directly on the Java platform. The core API is the API included in every full implementation of the Java platform. The core API gives you the following features: The Essentials: Objects, strings, threads, numbers, input and output, data structures, system properties, date and time, and so on. Applets: The set of conventions used by Java applets. Networking: URLs, TCP and UDP sockets, and IP addresses. Internationalization: Help for writing programs that can be localized for users worldwide. Programs can automatically adapt to specific locales and be displayed in the appropriate language.

Security: Both low-level and high-level, including electronic signatures, public/private key management, access control, and certificates. Software components: Known as JavaBeans, can plug into existing component architectures such as Microsoft's OLE/COM/Active-X architecture, OpenDoc, and Netscape's Live Connect.

Object serialization: Allows lightweight persistence and communication via Remote Method Invocation (RMI).

Java Database Connectivity (JDBC): Provides uniform access to a wide range of relational databases. Java will help to do the following: Get started quickly: Although Java is a powerful object-oriented language, it's easy to learn, especially for programmers already familiar with C or C++. Write less code: Comparisons of program metrics (class counts, method counts, and so on) suggest that a program written in Java can be four times smaller than the same program in C++. Write better code: The Java language encourages good coding practices, and its garbage collection helps you avoid memory leaks. Java's object orientation, its JavaBeans component architecture, and its wide-ranging, easily extendible API let you reuse other people's tested code and introduce fewer bugs. Develop programs faster: Your development time may be as much as twice as fast versus writing the same program in C++. Why? You write fewer lines of code with Java and Java is a simpler programming language than C++. Avoid platform dependencies with 100% Pure Java : You can keep your program portable by following the purity tips mentioned throughout this book and avoiding the use of libraries written in other languages. Write once, run anywhere: Because 100% Pure Java programs are compiled into machine-independent byte codes, they run consistently on any Java platform. Distribute software more easily: You can upgrade applets easily from a central server. Applets take advantage of the Java feature of allowing new classes to be loaded "on the fly," without recompiling the entire program.

2. SYSTEM ANALYSIS
2.1 PROBLEM DEFINITION
In this paper, we will first provide an introduction to wireless ad-hoc networks and thereafter an introduction to intrusion detection. It will present various existing intrusion detection techniques that can be adapted to wireless adhoc networks and finally propose a hybrid intrusion detection system for wireless ad-hoc networks. Wireless ad-hoc networks are increasingly being used in the tactical battlefield, emergency search and rescue missions, as well as civilian adhoc situations like conferences and classrooms due to the ease and speed in setting up such networks. As wireless ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks may no longer be sufficient and effective when adapted directly to a wireless ad-hoc network.

2.2 EXISTING SYSTEM


Existing methods of intrusion detection have to be modified and new methods have to be defined in order for intrusion detection to work effectively in this new network architecture. It will present various existing intrusion detection techniques that can be adapted to wireless ad-hoc networks. As wireless ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks may no longer be sufficient and effective when adapted directly to a wireless ad-hoc network.

Drawbacks of Existing System


Low level Security Network Traffic Low Reliability Packet lose

2.3 PROPOSED SYSTEM


In this paper, it have proposed intrusion detection community has been deals mainly on wired networks, but it is lack of security in wireless networks. Anomaly detection and signature detection are the two techniques used for intrusion detection system. Anomaly detection describes the abnormal patterns of behavior, where "abnormal" patterns are defined beforehand. Signature detection relies on the use of specifically known patterns of unauthorized behavior. Thus these techniques rely on sniffing packets and using the sniffed packets for analysis. In order to realize these ID techniques the packets can be sniffed on each of the end hosts. This is called as host intrusion detection (HID). It is also possible to sniff these packets on certain predetermined machines in the network. This is called as network intrusion detection (NID). Mobile agents are a special type of agents defined as "processes capable of roaming through large networks such as the adhoc wireless network, interacting with machines, collecting information and returning after executing the tasks adjusted by the user". Intrusion detection is an important part of computer security. It provides an additional layer of defense against computer is use after physical, authentication and access control.

Advantages of Proposed System


Using Fault Tolerance techniques and Encryption Centralized access High security Increases the system Reliability Using Active Networks

3. SYSTEM DESIGN
3.1 SYSTEM FLOW DIAGRAM

USER I

Management User Information

Ye s

Check for credenti al

No

Credential Information collection

Encryption

Yes

Intrusio n Detecti on

No

Sending Signal to Blocker

No

Detecti on Threat

Yes

No Access

User

II

10

3.2 MODULE SPECIFICATION


MODULE-1: In this module, we are going to connect the network .Each node is connected the neighboring node and it is independently deployed in network area. And also deploy the each port no is authorized in a node. MODULE-2: In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector. MODULE-3: The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this module check whether the path is authorized or unauthorized. If path is authorized the packet is send to valid destination. Otherwise the packet will be deleted. According port no only we are going to find the path is authorized or Unauthorized. MODULE-4: If the packet is received from other than the port no it will be filtered to destination. MODULE-5: In this module, after filtering the invalid packets all the valid Packets will reach the destination. and

discarded. This filter only removes the unauthorized packets and authorized packets send

11

4. TESTING & IMPLEMENTATION


4.1 SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub assemblies, assemblies and/or a finished product It is the process of exercising software with the intent of ensuring that the Software system meets its requirements and user expectations and does not fail in an unacceptable manner. There are various types of test. Each test type addresses a specific testing requirement. TYPES OF TESTS: Unit testing: Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be validated. It is the testing of individual software units of the application .it is done after the completion of an individual unit before integration. This is a structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform basic tests at component level and test a specific business process, application, and/or system configuration. Unit tests ensure that each unique path of a business process performs accurately to the documented specifications and contains clearly defined inputs and expected results. Integration testing: Integration tests are designed to test integrated software components to determine if they actually run as one program. Testing is event driven and is more concerned with the basic outcome of screens or fields. Integration tests demonstrate that although the 12

components were individually satisfaction, as shown by successfully unit testing, the combination of components is correct and consistent. Integration testing is specifically aimed at exposing the problems that arise from the combination of components. Functional test: Functional tests provide systematic demonstrations that functions tested are available as specified by the business and technical requirements, system documentation, and user manuals. Functional testing is centered on the following items: Valid Input Invalid Input Functions Output : : : : identified classes of valid input must be accepted. identified classes of invalid input must be rejected. identified functions must be exercised. identified classes of application outputs must be exercised.

Systems/Procedures: interfacing systems or procedures must be invoked. Organization and preparation of functional tests is focused on requirements, key functions, or special test cases. In addition, systematic coverage pertaining to identify Business process flows; data fields, predefined processes, and successive processes must be considered for testing. Before functional testing is complete, additional tests are identified and the effective value of current tests is determined. System Test: System testing ensures that the entire integrated software system meets requirements. It tests a configuration to ensure known and predictable results. An example of system testing is the configuration oriented system integration test. System testing is based on process descriptions and flows, emphasizing pre-driven process links and integration points.

White Box Testing:

13

White Box Testing is a testing in which in which the software tester has knowledge of the inner workings, structure and language of the software, or at least its purpose. It is purpose. It is used to test areas that cannot be reached from a black box level.

Black Box Testing: Black Box Testing is testing the software without any knowledge of the inner workings, structure or language of the module being tested. Black box tests, as most other kinds of tests, must be written from a definitive source document, such as specification or requirements document, such as specification or requirements document. It is a testing in which the software under test is treated, as a black box .you cannot see into it. The test provides inputs and responds to outputs without considering how the software works. Unit Testing: Unit testing is usually conducted as part of a combined code and unit test phase of the software lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct phases. Test strategy and approach

Field testing will be performed manually and functional tests will be written in detail. Test objectives: All field entries must work properly. Pages must be activated from the identified link. The entry screen, messages and responses must not be delayed. Features to be tested: Verify that the entries are of the correct format No duplicate entries should be allowed All links should take the user to the correct page.

14

Integration Testing: Software integration testing is the incremental integration testing of two or more integrated software components on a single platform to produce failures caused by interface defects. The task of the integration test is to check that components or software applications, e.g. components in a software system or one step up software applications at the company level interact without error. Test Results: All the test cases mentioned above passed successfully. No defects encountered. Acceptance Testing: User Acceptance Testing is a critical phase of any project and requires significant participation by the end user. It also ensures that the system meets the functional requirements.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.

4.2 SYSTEM IMPLEMENTATION


Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.

15

The implementation stage involves careful planning, investigation of the existing system and its constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.

5. CONCLUSION & SUGGESTION


CONCLUSION
In this work, an anomaly detection system comprises of detection modules for detecting anomalies in each layer. This system is cooperative and distributive; it considers the anomaly detection result from the neighbor nodes and sends the current working node's result to its neighbor nodes. Experimental results show that detection rate is increased when compared to the other mechanism. False positive rate is also reduced in this mechanism. Traditional security mechanism such as IDS and firewall have not been sufficient to provide the security of wireless networks, however, this mechanism is able to block abnormal approach to wireless networks and to detect previously unknown attacks as well as variations of known attacks.

SUGGESTION
Security problems should be addressed adequately before active networks are used outside the test and in the real world. Many researchers are actively working to solve these problems. This system can also be implementing for various homogenous and heterogeneous environments.

16

BIBLIOGRAPHY
Good Teachers are worth more than thousand books, we have them in Our Department References Made From: 1. Professional Java Network Programming 2. Java Complete Reference 4. Data Communications and Networking, by Behrouz A Forouzan. 5. Computer Networking: A Top-Down Approach, by James F. Kurose. 6. Operating System Concepts, by Abraham Silberschatz. Sites Referred: http://java.sun.com http://www.sourcefordgde.com http://www.networkcomputing.com/

17