SlideShare a Scribd company logo
Router Simulation System for
mitigating Network Security
attacks
Rohan Choudhari
BE(IT)
AEC,Beed
Background for This Project?
Basics of InfoSec
Confidentiality Integrity Availability
Prevents
Unauthorized
use or disclosure
of information
Safeguards the
accuracy and
Completeness
of information
Authorized users
have reliable
And timely access
to the resources
Why Security ?
 The internet was initially designed for connectivity
(ARPANET).
 Trust Assumed
 We do more with the internet nowadays
 Security protocols are added on the top of TCP/IP
 Fundamental aspects of information must be protected .
 Confidential data
 Employee information
 Business models
 Protect identity and resources
 We can’t keep ourselves isolated from the internet
 Most business communications are done online
 We provide online services
 We get services from 3rd party organizations
Attacks on different layers
Layer 7: DNS ,DHCP,HTTP,FTP,IMAP,LDAP,NTP,SSH,
SMTP, SMNP, Telnet,TFTP
Layer 5 :SMB, NFS,Socks
Layer 3 :IPv4,IPv6,ICMP
Layer 2 :PPTP , Token Ring
DNS poisoning,
phishing,
SQL injection
TCP Attack , Routing
attack, SYN flooding,
Sniffing
Ping ,ICMP ,Flood
ARP Spoofing ,MAC
Flooding
TCP Attacks
Exploits the TCP 3 way handshake
Attacker sends a series of SYN packets
without replying the ACK packet
Finite queue size for incomplete
connections
SYN
ACK
SYN+ACK
SERVER
TCP Attacks
Exploits the TCP 3 way handshake
Attacker sends a series of SYN packets
without replying the ACK packet
Finite queue size for incomplete
connections
SYN
SYN+ACK
SERVER
(victim)ACK ?
DNS cache poisoning
client
I want to access
www.example.com
DNS
catching
server
1
2
QID =64571
Root /GTLD
ns.example.comwebServer
192.168.1.1
3
3
www.example.com
192.168.1.1
QID =64571
QID=64569
QID=64570
QID=64571 Match !
(Pretending to be
Authoritative zone)
www.example.com
192.168.1.99
Common Types of attacks
Reconnaissance-ping sweeps and port scans
Sniffing –capture packet as they travel through the network
Man-in–the-middle-attack: intercepts messages that are intended for
a valid device.
Spoofing –sets up a fake device and trick others to send messages
to it.
Hijacking- taking control of session
Denial of service (DoS) Dynamic DoS (DDoS)attack
Trusted Network
Standard defensive-oriented technologies
 Firewall-first line of defense
 Intrusion Detection
 Build TRUST on top of the TCP/IP Infrastructure
 Strong authentication
 Two factor authentication
 Something you have + something you know
 Public key infrastructure (PKI)
Access control
Access control –
ability to permit or deny the use of an object by a subject
It provide 3 essential services (known as
AAA)-
 Authentication-(who can login)
 Authorization - (what authorized users can do )
 Accountability –(identifies what a user did )
Important Steps to Security
• Password Protection
• Protecting the network by filtering Network Access and Traffic (i.e. Firewall)
• Running Security Audits
• Examine and monitor log files
• Use commonense: avoid dumpster divers and social engineers
Firewalls
A firewall is a computer, hardware, or even a piece of software that sits between
your network and the Internet, the firewall attempts to regulate and control the flow
of information preventing an array of potential attacks.
 A router utilizing Network Address Translation(NAT)
 Software firewalls such as Zone Alarm, Kerio Firewall,
Outpost, etc.
 Hardware firewalls such as Sonic’s SOHO firewall.
 Operating system firewalls Ex.Window XP’s built in filtering .
Virtual Private Network
Creates a secure tunnel over a public network
 Client-to-firewall , router-to-router , firewall-to-
firewall
VPN protocol standards:
 PPTP-(Point-to-Point Tunneling protocol)
 L2F -(Layer to Forwarding Protocol)
 L2TP-(Layer to tunneling Protocol)
 IPSec(Internet Protocol Security)
network security / information security
Significance of this project
It makes your computer a router !
 And a Gateway router too!!
Benefits:
 Test new configurations
New routing policies
New protocols
 Don’t disturb the production network
 Use cheap PCs instead of expensive routers.
Screenshots of project
Choosing simulation Environment
Output screen showing proposed network
infrastructure in a simulated environment
Mesh Topology
Bus Topology Simulation
network security / information security
Choosing various routing algorithms for
simulaion
Simulating Source Routing Algorithm
Finding Algorithmic Efficiancy
Magic Starts Here …
network security / information security
network security / information security
conclusion
The Simulator takes the configurations of
the subnet as Input and gives the different
statistics of the routers and links. By
changing the routing algorithms and the
different network configurations and
recording the results we obtain the optimal
algorithm. The optimal algorithm for a
particular network is obtained by analyzing
the results obtained. Simulation helps to
achieve an optimal path that reduces the
cost of routing and helps to maintain
network efficiency very easily.
Conclusion And Future Scope
The smaller networks can be analyzed and the
results can be employed in larger networks to
make routing efficient and economic. As the
Simulator has provision for the crashing of
routers, it gives an idea of which path is followed
when a crash occurs. It can be employed in real
networks to increase the performance of routers
and links. As it not feasible in real networks to
test algorithms and then implement a best one,
Routing Simulation System can be helpful in
maintaining Network Security. Hence it is
useful for people who provide networking
services and those who design networks.
Thank You !
Rohan Choudhari
BE(IT)
AEC,Beed

More Related Content

PPT
Network security and protocols
PPT
Firewalls
PPT
Firewall
PDF
session7 Firewalls and VPN
PPTX
Firewall and It's Types
ODP
Wifi Security, or Descending into Depression and Drink
PPTX
Firewall & packet filter new
PDF
Firewall
Network security and protocols
Firewalls
Firewall
session7 Firewalls and VPN
Firewall and It's Types
Wifi Security, or Descending into Depression and Drink
Firewall & packet filter new
Firewall

What's hot (20)

PDF
PPT
Ch06 Wireless Network Security
PPTX
Firewall
PPT
Lecture 5 ip security
PDF
Firewall notes
PPTX
Firewall basics
PPTX
Firewall Design and Implementation
PPT
Windows 7 firewall & its configuration
PPT
Firewals in Network Security NS10
DOCX
Firewall configuration
PPT
Intoduction to Network Security NS1
PPTX
Firewalls and packet filters
PPTX
Firewall presentation
PDF
Firewall architectures
PPTX
Wi Fi Security
PPT
Firewall presentation m. emin özgünsür
PPTX
Firewall and its types and function
PPTX
Firewall
PPTX
Gateway and firewall
Ch06 Wireless Network Security
Firewall
Lecture 5 ip security
Firewall notes
Firewall basics
Firewall Design and Implementation
Windows 7 firewall & its configuration
Firewals in Network Security NS10
Firewall configuration
Intoduction to Network Security NS1
Firewalls and packet filters
Firewall presentation
Firewall architectures
Wi Fi Security
Firewall presentation m. emin özgünsür
Firewall and its types and function
Firewall
Gateway and firewall
Ad

Similar to network security / information security (20)

PPT
Network Security Chapter 7
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPT
IT8005_EC_Unit_III_Securing_Communication_Channels
PPT
New internet security
PPT
NewIinternet security
PDF
Architecting Secure Web Systems
PPTX
Network security - Defense in Depth
PPT
Network sec 1
PPTX
fundamental of network security
PDF
Overview of SMB, NetBIOS and other network attacks
PPT
Ch13 Protecting Networks with Security Devices
PPTX
PPTX
Internet infrastructure UNIT 5
PPTX
Cyber security
PPTX
Network and system administration Chapter 5.pptx
PDF
Network_Security1.pdf.pdf
PPT
Net Sec
PPT
Practical Network Security
PPTX
Network security
PPTX
Network security and System Admin
Network Security Chapter 7
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
IT8005_EC_Unit_III_Securing_Communication_Channels
New internet security
NewIinternet security
Architecting Secure Web Systems
Network security - Defense in Depth
Network sec 1
fundamental of network security
Overview of SMB, NetBIOS and other network attacks
Ch13 Protecting Networks with Security Devices
Internet infrastructure UNIT 5
Cyber security
Network and system administration Chapter 5.pptx
Network_Security1.pdf.pdf
Net Sec
Practical Network Security
Network security
Network security and System Admin
Ad

More from Rohan Choudhari (6)

PPTX
Network monitoring system for high availability infrastructure
PPTX
Spirometry
PPT
Net neutrality
PPT
Swine flu ppt
PPT
Water pollution
Network monitoring system for high availability infrastructure
Spirometry
Net neutrality
Swine flu ppt
Water pollution

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf

network security / information security

  • 1. Router Simulation System for mitigating Network Security attacks Rohan Choudhari BE(IT) AEC,Beed
  • 3. Basics of InfoSec Confidentiality Integrity Availability Prevents Unauthorized use or disclosure of information Safeguards the accuracy and Completeness of information Authorized users have reliable And timely access to the resources
  • 4. Why Security ?  The internet was initially designed for connectivity (ARPANET).  Trust Assumed  We do more with the internet nowadays  Security protocols are added on the top of TCP/IP  Fundamental aspects of information must be protected .  Confidential data  Employee information  Business models  Protect identity and resources  We can’t keep ourselves isolated from the internet  Most business communications are done online  We provide online services  We get services from 3rd party organizations
  • 5. Attacks on different layers Layer 7: DNS ,DHCP,HTTP,FTP,IMAP,LDAP,NTP,SSH, SMTP, SMNP, Telnet,TFTP Layer 5 :SMB, NFS,Socks Layer 3 :IPv4,IPv6,ICMP Layer 2 :PPTP , Token Ring DNS poisoning, phishing, SQL injection TCP Attack , Routing attack, SYN flooding, Sniffing Ping ,ICMP ,Flood ARP Spoofing ,MAC Flooding
  • 6. TCP Attacks Exploits the TCP 3 way handshake Attacker sends a series of SYN packets without replying the ACK packet Finite queue size for incomplete connections SYN ACK SYN+ACK SERVER
  • 7. TCP Attacks Exploits the TCP 3 way handshake Attacker sends a series of SYN packets without replying the ACK packet Finite queue size for incomplete connections SYN SYN+ACK SERVER (victim)ACK ?
  • 8. DNS cache poisoning client I want to access www.example.com DNS catching server 1 2 QID =64571 Root /GTLD ns.example.comwebServer 192.168.1.1 3 3 www.example.com 192.168.1.1 QID =64571 QID=64569 QID=64570 QID=64571 Match ! (Pretending to be Authoritative zone) www.example.com 192.168.1.99
  • 9. Common Types of attacks Reconnaissance-ping sweeps and port scans Sniffing –capture packet as they travel through the network Man-in–the-middle-attack: intercepts messages that are intended for a valid device. Spoofing –sets up a fake device and trick others to send messages to it. Hijacking- taking control of session Denial of service (DoS) Dynamic DoS (DDoS)attack
  • 10. Trusted Network Standard defensive-oriented technologies  Firewall-first line of defense  Intrusion Detection  Build TRUST on top of the TCP/IP Infrastructure  Strong authentication  Two factor authentication  Something you have + something you know  Public key infrastructure (PKI)
  • 11. Access control Access control – ability to permit or deny the use of an object by a subject It provide 3 essential services (known as AAA)-  Authentication-(who can login)  Authorization - (what authorized users can do )  Accountability –(identifies what a user did )
  • 12. Important Steps to Security • Password Protection • Protecting the network by filtering Network Access and Traffic (i.e. Firewall) • Running Security Audits • Examine and monitor log files • Use commonense: avoid dumpster divers and social engineers
  • 13. Firewalls A firewall is a computer, hardware, or even a piece of software that sits between your network and the Internet, the firewall attempts to regulate and control the flow of information preventing an array of potential attacks.  A router utilizing Network Address Translation(NAT)  Software firewalls such as Zone Alarm, Kerio Firewall, Outpost, etc.  Hardware firewalls such as Sonic’s SOHO firewall.  Operating system firewalls Ex.Window XP’s built in filtering .
  • 14. Virtual Private Network Creates a secure tunnel over a public network  Client-to-firewall , router-to-router , firewall-to- firewall VPN protocol standards:  PPTP-(Point-to-Point Tunneling protocol)  L2F -(Layer to Forwarding Protocol)  L2TP-(Layer to tunneling Protocol)  IPSec(Internet Protocol Security)
  • 16. Significance of this project It makes your computer a router !  And a Gateway router too!! Benefits:  Test new configurations New routing policies New protocols  Don’t disturb the production network  Use cheap PCs instead of expensive routers.
  • 19. Output screen showing proposed network infrastructure in a simulated environment
  • 23. Choosing various routing algorithms for simulaion
  • 29. conclusion The Simulator takes the configurations of the subnet as Input and gives the different statistics of the routers and links. By changing the routing algorithms and the different network configurations and recording the results we obtain the optimal algorithm. The optimal algorithm for a particular network is obtained by analyzing the results obtained. Simulation helps to achieve an optimal path that reduces the cost of routing and helps to maintain network efficiency very easily.
  • 30. Conclusion And Future Scope The smaller networks can be analyzed and the results can be employed in larger networks to make routing efficient and economic. As the Simulator has provision for the crashing of routers, it gives an idea of which path is followed when a crash occurs. It can be employed in real networks to increase the performance of routers and links. As it not feasible in real networks to test algorithms and then implement a best one, Routing Simulation System can be helpful in maintaining Network Security. Hence it is useful for people who provide networking services and those who design networks.
  • 31. Thank You ! Rohan Choudhari BE(IT) AEC,Beed