12

Final project porposal

Embed Size (px)

DESCRIPTION

token based authentication and behaviour analysis

Citation preview

Page 1: Final project porposal
Page 2: Final project porposal

By

Harpreet Singh(005788029)

Bhanu Chandra Namaniwar(005773911)

Advisor : Co-advisor:

Prof.Jalel Rejeb Prof. Morris Jones

Page 3: Final project porposal

Secure and

enhanced authentication in 802.1x wireless standard by:

T

oken Based Authentication

N

etwork Behavior Analysis

Page 4: Final project porposal

Addition of following in 802.1x : Hardware Tokens Network Behavior Analysis

Results : Hardware authentication Monitoring user’s activities

Which provides:Strong authentication as compared to

traditional 802.1x

Page 5: Final project porposal

Implement hardware authentication

Monitor and record client’s activities

Detect intrusion in the network

Detect anomaly in client’s behavior

Page 6: Final project porposal

Authentication server

client

Authenticator

client

Authenticator

Authentication server

unusual

usual

Page 7: Final project porposal

Improvement in 802.1x by

implementing:

Hardware authentication

Record and monitor client’s activity

Double authentication achievement

Page 8: Final project porposal

Study : 802.1x authentication standard framework Hardware tokens (eg:smart cards, USB sticks

etc.) Network Behavior Analysis tools(eg:flowmatrix,

wireshark, java programming tools etc.) Developing block diagram Implementing 802.1x network Adding hardware token based authentication Installing Network behavior analysis tools to

monitor and record client’s activity Final debugging Verification and comparison against traditional

802.1x Final report and presentation

Page 9: Final project porposal

Supplicant software

Authenticator configuration

Authentication server installation

E-trust identity guard mini token

Wireshark for traffic monitoring

Flowmatrix for recording and

analyzing

Page 10: Final project porposal

802.1x implementation on a simple network (2 weeks)

Study on hardware token devices (1 week)

Implementation of hardware token (1 week)

Study on NBA (2 weeks)

Problems resolving in token based authentication Implementation (1 week)

Implementation of NBA in network (2 weeks)

Problems resolving in NBA implementation (2 weeks)

Problems faced and resolving in overall project (1 week)

Project report ( 2 weeks)

Page 11: Final project porposal

1) Presentation on 802.1x Overview by Sudheer Nath. Cisco Systems2) Paper on 802.1x by Ronny Haryanto.3) Paper on 802.1x and PEAP by STEVE RILEY, Senior Consultant, MCS

Trustworthy computing services.4) How to Use Network Behavior Analysis Tools,

http://www.csoonline.com/article/458746/How_to_Use_Network_Behavior_Analysis_Tools

5) Li He, Shunzheng Yu, Min Li “Anomaly Detection Based on Available Bandwidth Estimation”2008.

6) Bin Zeng , Dafang Zhang , Wenwei Li , Gaogang Xie ,Guangxing Zhang “Design and Implementation of a Network Behavior Analysis-oriented IP

7) Network Measurement System” The 9th International Conference for Young Computer Scientists

8) M. A. CaturBhakti, A. Abdullah, and L. T.Jung “EAP-based Authentication with EAP Method Selection Mechanism”2007.

9) Kulkarni, U.; Vadavi, J.V.; Joshi, S.M.; Sekaran, K.C.; Yardi, A.R “Distributed Multi level Security token based Authentication for Ubiquitous Objects” 2006.

10) Vipin, M.; Sarad, A.V.; Sankar, K. “A Multi Way Tree for Token Based Authentication” 2008.

11) Shu Yun Lim, Andy Jones “Network Anomaly Detection System: The State of Art of Network Behaviour Analysis”,2008

Page 12: Final project porposal

QUESTIONS ?