SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
STARS: A Statistical Traffic Pattern Discovery System 
for MANETs 
ABSTRACT: 
Many anonymity enhancing techniques have been proposed based on packet encryption to protect 
the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we 
show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To 
demonstrate how to discover the communication patterns without decrypting the captured 
packets, we present a novel statistical traffic pattern discovery system (STARS). STARS works 
passively to perform traffic analysis based on statistical characteristics of captured raw traffic. 
STARS is capable of discovering the sources, the destinations, and the end-to-end communication 
relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the 
hidden traffic patterns. 
EXISTING SYSTEM: 
Evidence-based statistical traffic analysis model, every captured packet is treated as evidence 
supporting a point-to-point (one-hop) transmission between the sender and the receiver. A 
sequence of point-to-point traffic matrices is created, and then they are used to derive end- to-end 
(multihop) relations. This approach provides a practical attacking framework against MANETs 
but still leaves substantial information about the communication patterns undiscovered. MANET 
systems can achieve very restricted communication anonymity under the attack of STARS.
Statistical traffic analysis attacks have attracted broad interests due to their passive nature, i.e., 
attackers only need toc ollect information and perform analysis quietly without changing the 
network behavior (such as injecting or modifying packets). The predecessor attacks and disclosure 
attacks are two representatives. 
However, all these previous approaches do not work well to analyze MANET traffic because of the 
following three natures of MANETs: 
1) The broadcasting nature: In wired networks, a point-to-point message transmission usually has 
only one possible receiver. While in wireless networks, a message is broadcasted, which can have 
multiple possible receivers and so in curs additional uncertainty. 
2) The ad hoc nature: MANETs lack network infrastructure, and each mobile node can serve as 
both a host and a router. Thus, it is difficult to determine the role of a mobile node to be a 
source, a destination, or just a relay. 
3) The mobile nature: Most of existing traffic analysis models does not take into consideration the 
mobility of communication peers, which make the communication relations among mobile nodes 
more complex. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Approaches do not work well to analyze MANET traffic. 
 The scheme fails to address several important constrains when deriving the end-to-end traffic from the one 
hop evidences. 
 It does not provide a method to identify the actual source and destination nodes (or to calculate the 
source/destination probability distribution). 
 Most of the previous approaches are partial attacks in the sense that they either only try to identify the 
source (or destination) nodes or to find out the corresponding destination (source) nodes for given 
particular source (destination) nodes. 
PROPOSED SYSTEM: 
 We propose a novel STARS for MANETs. STARS is basically an attacking system, which only needs to 
capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted 
packets. 
 From the captured packets, STARS constructs a sequence of point-to-point traffic matrices to derive the 
end-to-end traffic matrix, and then uses a heuristic data processing model to reveal the hidden traffic 
patterns from the end-to-end matrix. 
 In this paper, we propose a novel statistical traffic pattern discovery system (STARS). STARS aims to 
derive the source/destination probability distribution, i.e., the probability for each node to be a message
source/destination, and the end-to-end link probability distribution, i.e., the probability for each pair 
ofnodes to be an end-to-end communication pair. 
 To achieve its goals, STARS includes two major steps: 
1) Construct point-to-point traffic matrices using the time-slicing technique, and then derive the 
end-to-end traffic matrix with a set of traffic filtering rules; and 
2) Apply a heuristic approach to identify the actual source and destination nodes, and then 
correlate the source nodes with their corresponding destinations. 
ADVANTAGES OF PROPOSED SYSTEM: 
The attacker can take advantage of STARS to perform traffic analysis as follows: 
 Divide the entire network into multiple regions geographically; 
 Deploy sensors along the boundaries of each region 
 To monitor the cross-component traffic; 
 Treat each region as a super node and use STARS to figure out the sources, destinations, and end-to-end 
communication relations; and 
 Analyze the traffic even when nodes are close to each other by treating the close nodes as a super node. 
SYSTEM ARCHITECTURE: 
WORK FLOW: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 44 Mb. 
 Monitor : 15 VGA Colour. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7/LINUX. 
 Implementation : NS2 
 NS2 Version : 2.28 
 Front End : OTCL (Object Oriented Tool Command Language) 
 Tool : Cygwin (To simulate in Windows OS) 
REFERENCE: 
Yang Qin, Dijiang Huang, and Bing Li,“STARS: A Statistical Traffic Pattern Discovery System for 
MANETs,” MARCH/APRIL 2014.

More Related Content

DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOC
Stars : a statistical traffic pattern discovery system for manets
PPTX
Presentation
PDF
IEEE PROJECT TOPICS &ABSTRACTS on image processing
PDF
C017541928
PDF
IEEE Wireless communication 2016 Title and Abstract
DOCX
Consensus based multiple-model bayesian filtering for distributed tracking
PDF
Microtemporality: At The Time When Loading-in-progress
JPN1423 Stars a Statistical Traffic Pattern
Stars : a statistical traffic pattern discovery system for manets
Presentation
IEEE PROJECT TOPICS &ABSTRACTS on image processing
C017541928
IEEE Wireless communication 2016 Title and Abstract
Consensus based multiple-model bayesian filtering for distributed tracking
Microtemporality: At The Time When Loading-in-progress

What's hot (15)

PPTX
Information Extraction
PPTX
Connectivity
DOCX
On the role of mobility for multi message gossip
PDF
D021203019025
PDF
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
PDF
A Review on Traffic Classification Methods in WSN
PDF
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
PDF
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
PDF
Online stream mining approach for clustering network traffic
PDF
Online stream mining approach for clustering network traffic
DOCX
Segmentation of Machine learning Algorithm
DOCX
JPM1417 Characterness: An Indicator of Text in the Wild
PDF
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Information Extraction
Connectivity
On the role of mobility for multi message gossip
D021203019025
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
A Review on Traffic Classification Methods in WSN
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
Segmentation of Machine learning Algorithm
JPM1417 Characterness: An Indicator of Text in the Wild
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Ad

Viewers also liked (6)

PDF
Primera parte
DOCX
Guia de estudio
PPT
Church History of Tiruchirappalli DCC in Trichy Tanjore Diocese
PPTX
Tipos de relógio
PPTX
Ebs dec2015 arachnoid cyst
DOCX
Modelos de negocio tradicional y modelos de negocio en la economía digital
Primera parte
Guia de estudio
Church History of Tiruchirappalli DCC in Trichy Tanjore Diocese
Tipos de relógio
Ebs dec2015 arachnoid cyst
Modelos de negocio tradicional y modelos de negocio en la economía digital
Ad

Similar to IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic pattern discovery system (20)

DOCX
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
DOCX
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
PDF
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
PDF
STATISTICAL DISCLOSURE OF TRAFFIC ON ANONYMOUS SYSTEM USING MANETs
PDF
Ijcatr04041022
PDF
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
PDF
A New Approach for Improving Performance of Intrusion Detection System over M...
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
A novel approach for a secured intrusion detection system in manet
PDF
Iaetsd baack better adaptive
PDF
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
PDF
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
PPTX
Network Intrusion Detection Systems #2
PPTX
Comparison of network intrusion detection
PDF
A dynamic approach for improving performance of intrusion detection system ov...
PDF
IRJET - Security and Privacy by IDS System
PPT
Attacks in MANET
DOC
Cloud data management
PDF
Performance analysis of mobile ad hoc network
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
STATISTICAL DISCLOSURE OF TRAFFIC ON ANONYMOUS SYSTEM USING MANETs
Ijcatr04041022
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
A New Approach for Improving Performance of Intrusion Detection System over M...
A wireless intrusion detection system and a new attack model (synopsis)
A novel approach for a secured intrusion detection system in manet
Iaetsd baack better adaptive
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
Network Intrusion Detection Systems #2
Comparison of network intrusion detection
A dynamic approach for improving performance of intrusion detection system ov...
IRJET - Security and Privacy by IDS System
Attacks in MANET
Cloud data management
Performance analysis of mobile ad hoc network

More from IEEEBEBTECHSTUDENTPROJECTS (20)

DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentic...
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning

Recently uploaded (20)

PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
additive manufacturing of ss316l using mig welding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
composite construction of structures.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Construction Project Organization Group 2.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Lesson 3_Tessellation.pptx finite Mathematics
additive manufacturing of ss316l using mig welding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT 4 Total Quality Management .pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Lecture Notes Electrical Wiring System Components
Operating System & Kernel Study Guide-1 - converted.pdf
Sustainable Sites - Green Building Construction
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
composite construction of structures.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Construction Project Organization Group 2.pptx

IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic pattern discovery system

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com STARS: A Statistical Traffic Pattern Discovery System for MANETs ABSTRACT: Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To demonstrate how to discover the communication patterns without decrypting the captured packets, we present a novel statistical traffic pattern discovery system (STARS). STARS works passively to perform traffic analysis based on statistical characteristics of captured raw traffic. STARS is capable of discovering the sources, the destinations, and the end-to-end communication relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the hidden traffic patterns. EXISTING SYSTEM: Evidence-based statistical traffic analysis model, every captured packet is treated as evidence supporting a point-to-point (one-hop) transmission between the sender and the receiver. A sequence of point-to-point traffic matrices is created, and then they are used to derive end- to-end (multihop) relations. This approach provides a practical attacking framework against MANETs but still leaves substantial information about the communication patterns undiscovered. MANET systems can achieve very restricted communication anonymity under the attack of STARS.
  • 2. Statistical traffic analysis attacks have attracted broad interests due to their passive nature, i.e., attackers only need toc ollect information and perform analysis quietly without changing the network behavior (such as injecting or modifying packets). The predecessor attacks and disclosure attacks are two representatives. However, all these previous approaches do not work well to analyze MANET traffic because of the following three natures of MANETs: 1) The broadcasting nature: In wired networks, a point-to-point message transmission usually has only one possible receiver. While in wireless networks, a message is broadcasted, which can have multiple possible receivers and so in curs additional uncertainty. 2) The ad hoc nature: MANETs lack network infrastructure, and each mobile node can serve as both a host and a router. Thus, it is difficult to determine the role of a mobile node to be a source, a destination, or just a relay. 3) The mobile nature: Most of existing traffic analysis models does not take into consideration the mobility of communication peers, which make the communication relations among mobile nodes more complex. DISADVANTAGES OF EXISTING SYSTEM:  Approaches do not work well to analyze MANET traffic.  The scheme fails to address several important constrains when deriving the end-to-end traffic from the one hop evidences.  It does not provide a method to identify the actual source and destination nodes (or to calculate the source/destination probability distribution).  Most of the previous approaches are partial attacks in the sense that they either only try to identify the source (or destination) nodes or to find out the corresponding destination (source) nodes for given particular source (destination) nodes. PROPOSED SYSTEM:  We propose a novel STARS for MANETs. STARS is basically an attacking system, which only needs to capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted packets.  From the captured packets, STARS constructs a sequence of point-to-point traffic matrices to derive the end-to-end traffic matrix, and then uses a heuristic data processing model to reveal the hidden traffic patterns from the end-to-end matrix.  In this paper, we propose a novel statistical traffic pattern discovery system (STARS). STARS aims to derive the source/destination probability distribution, i.e., the probability for each node to be a message
  • 3. source/destination, and the end-to-end link probability distribution, i.e., the probability for each pair ofnodes to be an end-to-end communication pair.  To achieve its goals, STARS includes two major steps: 1) Construct point-to-point traffic matrices using the time-slicing technique, and then derive the end-to-end traffic matrix with a set of traffic filtering rules; and 2) Apply a heuristic approach to identify the actual source and destination nodes, and then correlate the source nodes with their corresponding destinations. ADVANTAGES OF PROPOSED SYSTEM: The attacker can take advantage of STARS to perform traffic analysis as follows:  Divide the entire network into multiple regions geographically;  Deploy sensors along the boundaries of each region  To monitor the cross-component traffic;  Treat each region as a super node and use STARS to figure out the sources, destinations, and end-to-end communication relations; and  Analyze the traffic even when nodes are close to each other by treating the close nodes as a super node. SYSTEM ARCHITECTURE: WORK FLOW: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : 2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Yang Qin, Dijiang Huang, and Bing Li,“STARS: A Statistical Traffic Pattern Discovery System for MANETs,” MARCH/APRIL 2014.