Browse By Repository:

 
 
 
   

Raspberry Pi dos attack detector using signature based approach for IPv6 Tunneling security

Abu Zah, Imam Mukhsineen (2017) Raspberry Pi dos attack detector using signature based approach for IPv6 Tunneling security. Project Report. Universiti Teknikal Malaysia Melaka, Melaka, Malaysia. (Submitted)

[img] Text (24 Pages)
Raspberry Pi dos attack detector using signature based approach for IPv6 Tunneling security.pdf - Submitted Version

Download (694kB)
[img] Text (Full text)
Raspberry Pi dos attack detector using signature based approach for IPv6 Tunneling security.pdf - Submitted Version

Download (1MB)

Abstract

IPv6 transition mechanism was introduced in order to permit hosts on an IPv4 network to communicate with hosts on an IPv6 network, and vice versa. There are vulnerabilities identified in this protocol suite and transition mechanism has been manipulated as a platform to perform threats that exploit those vulnerabilities. Present of attack that are hidden in the transition mechanism tunnel payload are unable to be detected. Hence, it is important to develop tool that can do attack detection through the transition mechanism. This project is about to detecting DoS attack by using Raspberry Pi with signature based approach on IPv6 Tunneling environment. IPv6 Transition Mechanism vulnerabilities currently exist, and as the popularity of the IPv6 protocol increases, so the number of threats does. IPv6 Transition Mechanism exploited as attack medium. This makes tunneling mechanism susceptible to be used in attacks such as DOS attack. The purpose of this project is to identify the possible threats in the transition mechanism. By using signature based approach, this project can show how the transition mechanism is exploited by attacker clearly. This project also produces a prototype that will scan all the network activity inside the transition mechanism to detect any presence of transition mechanism attack. Raspberry Pi is used in this project to send live alerts and notify upon occurrence of attacks. Build a testing method by simulating the attack to test the effectiveness of the proposed prototype in detecting the presence of threats. This project contains planning and analysis, design and implementation phases of the project, and testing. Planning and analysis phase includes the literature review to identify the current problem and make the best solution to overcome the problems. Next, a design and implementation phase of this project is developing a prototype Intrusion Detection System which can detect the attack by the rules that have been set. Lastly, perform the testing by simulate threat detection either successful or not.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Raspberry Pi, Transition mechanism, Threats
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Final Year Project > FTMK
Depositing User: Sabariah Ismail
Date Deposited: 14 May 2024 08:01
Last Modified: 14 May 2024 08:01
URI: http://digitalcollection.utem.edu.my/id/eprint/32425

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year