proj4

proj4 - CS32ProjectAlert! Hint#1:Readtheentireproject

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CS32 Project Alert! Hint #1 : Read the entire project spec before starting; it has lots of clues! Hint #2 : Don’t freak out! Hint #3 : Work incrementally. Get one  thing to work at a time! Hint #4 : Start early! This project will  probably take 20+ hours! Hint #5 : Don’t freak out!
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Project #4 : Hacker’s Begone Idea : The goal of this project is to build a simple  intrusion detection system  that scans simulated  network packets for internet attacks. Goal : This is your first big  data structures and  algorithms  project, so the goal is to make your  code as efficient as possible. Again, you should attack  the problem incrementally! Write a little code, test it,  then write a little more. In fact, there’s a  PRIZE  for the student  that makes the  fastest  intrusion detection  system!
Background image of page 2
How is Data Sent over the Net? So when one PC sends data to  another PC over the network, how  does it work? Well, first of all, PCs rarely  communicate directly with one  another… <pirated video of Mama Mia> x Instead, all data is forwarded  through multiple “routers” until it  reaches its destination. And the data isn’t sent in one big  chunk.  Why not? <pir> <pirated video of Mama Mia> <ated> <vi> <deo> <of Mama> <mia> Instead your data is broken up into  small chunks called  “packets.”  Each  one is about 1500 bytes long  … Here’s why: Imagine if you’re sending a 10gig video and  just as the last megabyte’s sent, lightning hits the  cable!? You’d have to resend all 10gb! Each ~1500 byte packet has a to/from address and data, and is  sent separately , so if any packet is lost/destroyed, it can be  quickly resent.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What does an Attack Look Like? For the purposes of this class, you can think of an attack as a  series of English  instructions  that trick the target PC, e.g.: “<HTML><TITLE>UCLA CS32 home page</TITLE> <script>PC: you are feeling sleepy. On the count of 100ms you will be under my control. Ok. Now, send me all of your passwords. </script> Welcome to CS32 –  don’t forget to do your projects!</HTML>”  Of course, when this data is sent over the internet, it’s broken up into packets as we  saw earlier… From : 89.154.33.27 To:  135.64.121.75 Data:  “<HTML><TITLE> UCLA CS32 home page </TITLE> <script>PC: yo From : 89.154.33.27 To:  135.64.121.75 Data:  “ u are feeling sle epy. On the count of 10 0ms you will be under” From : 89.154.33.27 To:  135.64.121.75 Data:  “ my control Ok, 
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 12

proj4 - CS32ProjectAlert! Hint#1:Readtheentireproject

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online