SlideShare uma empresa Scribd logo
1 de 3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
STARS: A Statistical Traffic Pattern Discovery System 
for MANETs 
ABSTRACT: 
Many anonymity enhancing techniques have been proposed based on packet encryption to protect 
the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we 
show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To 
demonstrate how to discover the communication patterns without decrypting the captured 
packets, we present a novel statistical traffic pattern discovery system (STARS). STARS works 
passively to perform traffic analysis based on statistical characteristics of captured raw traffic. 
STARS is capable of discovering the sources, the destinations, and the end-to-end communication 
relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the 
hidden traffic patterns. 
EXISTING SYSTEM: 
Evidence-based statistical traffic analysis model, every captured packet is treated as evidence 
supporting a point-to-point (one-hop) transmission between the sender and the receiver. A 
sequence of point-to-point traffic matrices is created, and then they are used to derive end- to-end 
(multihop) relations. This approach provides a practical attacking framework against MANETs 
but still leaves substantial information about the communication patterns undiscovered. MANET 
systems can achieve very restricted communication anonymity under the attack of STARS.
Statistical traffic analysis attacks have attracted broad interests due to their passive nature, i.e., 
attackers only need toc ollect information and perform analysis quietly without changing the 
network behavior (such as injecting or modifying packets). The predecessor attacks and disclosure 
attacks are two representatives. 
However, all these previous approaches do not work well to analyze MANET traffic because of the 
following three natures of MANETs: 
1) The broadcasting nature: In wired networks, a point -to-point message transmission usually has 
only one possible receiver. While in wireless networks, a message is broadcasted, which can have 
multiple possible receivers and so in curs additional uncertainty. 
2) The ad hoc nature: MANETs lack network infrastructure, and each mobile node can serve as 
both a host and a router. Thus, it is difficult to determine the role of a mobile node to be a 
source, a destination, or just a relay. 
3) The mobile nature: Most of existing traffic analysis models does not take into consideration the 
mobility of communication peers, which make the communication relations among mobile nodes 
more complex. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Approaches do not work well to analyze MANET traffic. 
 The scheme fails to address several important constrains when deriving the end-to-end traffic from the one 
hop evidences. 
 It does not provide a method to identify the actual source and destination nodes (or to calculate the 
source/destination probability distribution). 
 Most of the previous approaches are partial attacks in the sense that they either only try to identify the 
source (or destination) nodes or to find out the corresponding destination (source) nodes for given 
particular source (destination) nodes. 
PROPOSED SYSTEM: 
 We propose a novel STARS for MANETs. STARS is basically an attacking system, which only needs to 
capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted 
packets. 
 From the captured packets, STARS constructs a sequence of point-to-point traffic matrices to derive the 
end-to-end traffic matrix, and then uses a heuristic data processing model to reveal the hidden traffic 
patterns from the end-to-end matrix. 
 In this paper, we propose a novel statistical traffic pattern discovery system (STARS). STARS aims to 
derive the source/destination probability distribution, i.e., the probability for each node to be a message
source/destination, and the end-to-end link probability distribution, i.e., the probability for each pair 
ofnodes to be an end-to-end communication pair. 
 To achieve its goals, STARS includes two major steps: 
1) Construct point-to-point traffic matrices using the time-slicing technique, and then derive the 
end-to-end traffic matrix with a set of traffic filtering rules; and 
2) Apply a heuristic approach to identify the actual source and destination nodes, and then 
correlate the source nodes with their corresponding destinations. 
ADVANTAGES OF PROPOSED SYSTEM: 
The attacker can take advantage of STARS to perform traffic analysis as follows: 
 Divide the entire network into multiple regions geographically; 
 Deploy sensors along the boundaries of each region 
 To monitor the cross-component traffic; 
 Treat each region as a super node and use STARS to figure out the sources, destinations, and end-to-end 
communication relations; and 
 Analyze the traffic even when nodes are close to each other by treating the close nodes as a super node. 
SYSTEM ARCHITECTURE: 
WORK FLOW: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 44 Mb. 
 Monitor : 15 VGA Colour. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7/LINUX. 
 Implementation : NS2 
 NS2 Version : 2.28 
 Front End : OTCL (Object Oriented Tool Command Language) 
 Tool : Cygwin (To simulate in Windows OS) 
REFERENCE: 
Yang Qin, Dijiang Huang, and Bing Li,“STARS: A Statistical Traffic Pattern Discovery System for 
MANETs,” MARCH/APRIL 2014.

Mais conteúdo relacionado

Mais procurados

Consensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed trackingConsensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed tracking
ieeeprojectsbangalore
 

Mais procurados (12)

D021203019025
D021203019025D021203019025
D021203019025
 
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
 
Information Extraction
Information ExtractionInformation Extraction
Information Extraction
 
Consensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed trackingConsensus based multiple-model bayesian filtering for distributed tracking
Consensus based multiple-model bayesian filtering for distributed tracking
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progress
 
Connectivity
ConnectivityConnectivity
Connectivity
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Segmentation of Machine learning Algorithm
Segmentation of Machine learning AlgorithmSegmentation of Machine learning Algorithm
Segmentation of Machine learning Algorithm
 

Semelhante a 2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic pattern discovery system

Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
Iaetsd Iaetsd
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
Paper id 2120147
Paper id 2120147Paper id 2120147
Paper id 2120147
IJRAT
 

Semelhante a 2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic pattern discovery system (20)

Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Mphasisintern
MphasisinternMphasisintern
Mphasisintern
 
Manet
ManetManet
Manet
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
 
Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane ts
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Paper id 2120147
Paper id 2120147Paper id 2120147
Paper id 2120147
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 

Mais de IEEEBEBTECHSTUDENTSPROJECTS

Mais de IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Último (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic pattern discovery system

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com STARS: A Statistical Traffic Pattern Discovery System for MANETs ABSTRACT: Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To demonstrate how to discover the communication patterns without decrypting the captured packets, we present a novel statistical traffic pattern discovery system (STARS). STARS works passively to perform traffic analysis based on statistical characteristics of captured raw traffic. STARS is capable of discovering the sources, the destinations, and the end-to-end communication relations. Empirical studies demonstrate that STARS achieves good accuracy in disclosing the hidden traffic patterns. EXISTING SYSTEM: Evidence-based statistical traffic analysis model, every captured packet is treated as evidence supporting a point-to-point (one-hop) transmission between the sender and the receiver. A sequence of point-to-point traffic matrices is created, and then they are used to derive end- to-end (multihop) relations. This approach provides a practical attacking framework against MANETs but still leaves substantial information about the communication patterns undiscovered. MANET systems can achieve very restricted communication anonymity under the attack of STARS.
  • 2. Statistical traffic analysis attacks have attracted broad interests due to their passive nature, i.e., attackers only need toc ollect information and perform analysis quietly without changing the network behavior (such as injecting or modifying packets). The predecessor attacks and disclosure attacks are two representatives. However, all these previous approaches do not work well to analyze MANET traffic because of the following three natures of MANETs: 1) The broadcasting nature: In wired networks, a point -to-point message transmission usually has only one possible receiver. While in wireless networks, a message is broadcasted, which can have multiple possible receivers and so in curs additional uncertainty. 2) The ad hoc nature: MANETs lack network infrastructure, and each mobile node can serve as both a host and a router. Thus, it is difficult to determine the role of a mobile node to be a source, a destination, or just a relay. 3) The mobile nature: Most of existing traffic analysis models does not take into consideration the mobility of communication peers, which make the communication relations among mobile nodes more complex. DISADVANTAGES OF EXISTING SYSTEM:  Approaches do not work well to analyze MANET traffic.  The scheme fails to address several important constrains when deriving the end-to-end traffic from the one hop evidences.  It does not provide a method to identify the actual source and destination nodes (or to calculate the source/destination probability distribution).  Most of the previous approaches are partial attacks in the sense that they either only try to identify the source (or destination) nodes or to find out the corresponding destination (source) nodes for given particular source (destination) nodes. PROPOSED SYSTEM:  We propose a novel STARS for MANETs. STARS is basically an attacking system, which only needs to capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted packets.  From the captured packets, STARS constructs a sequence of point-to-point traffic matrices to derive the end-to-end traffic matrix, and then uses a heuristic data processing model to reveal the hidden traffic patterns from the end-to-end matrix.  In this paper, we propose a novel statistical traffic pattern discovery system (STARS). STARS aims to derive the source/destination probability distribution, i.e., the probability for each node to be a message
  • 3. source/destination, and the end-to-end link probability distribution, i.e., the probability for each pair ofnodes to be an end-to-end communication pair.  To achieve its goals, STARS includes two major steps: 1) Construct point-to-point traffic matrices using the time-slicing technique, and then derive the end-to-end traffic matrix with a set of traffic filtering rules; and 2) Apply a heuristic approach to identify the actual source and destination nodes, and then correlate the source nodes with their corresponding destinations. ADVANTAGES OF PROPOSED SYSTEM: The attacker can take advantage of STARS to perform traffic analysis as follows:  Divide the entire network into multiple regions geographically;  Deploy sensors along the boundaries of each region  To monitor the cross-component traffic;  Treat each region as a super node and use STARS to figure out the sources, destinations, and end-to-end communication relations; and  Analyze the traffic even when nodes are close to each other by treating the close nodes as a super node. SYSTEM ARCHITECTURE: WORK FLOW: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : 2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Yang Qin, Dijiang Huang, and Bing Li,“STARS: A Statistical Traffic Pattern Discovery System for MANETs,” MARCH/APRIL 2014.