Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As.

Slides:



Advertisements
Similar presentations
Companies can suffer numerous problems due to poor management of resources and careless decisions. In real-world decision- making, many organizations lack.
Advertisements

Project 2002 A Proposal Application Project 2002 Actions.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Passage Three Introduction to Microsoft SQL Server 2000.
Figure 1 Personal Efforts Estimated Resources Financial Budget and Other Resources Table 1 Project Requirements Design Objective Concise, non-intimidating,
What is SMEcollaborate Primarily developed for Small and Medium Companies who wish to collaborate together. It is a:- A resource center for collaborating.
Job Offer/Continuing Education Evaluation Labor CostsHoursRate($10.30/Hr) Luke195 $ 2, Stephanie175 $ 1, Matt185 $ 1, Randy205 $ 2,
Abstract Other Resources Financial Resources Project Schedule Personnel Efforts Item DescriptionCost STK300 Microcontrollerdonated (Kanda) GM28 Cellular.
ISU Alumni Association Online Store Abstract The Iowa State University Alumni Association desires a complete overhaul of their online store. The current.
Feasibility Study.
Optical Encoder for a Game Steering Wheel May Team members Sam DahlkeCpr E Peter FecteauCpr E Dan PatesEE Lorenzo SubidoEE Advisors Dr. James Davis.
Pump Controller Team Number: May06-12 Team Members Dwayne Stammer CprE Francois Munyakazi EE Dan Paulsen CprE/EE Faculity Advisor Nicola Elia Client Viking.
Project Ongo-08a Information Software is required that would Provide mathematical problems that will improve student’s problem solving skills Provide teachers.
Abstract Evidence can be the key to convicting someone of a crime, or acquitting a person of charges brought against them. To make sure the evidence is.
May05-36: Boone Cemetery Management Software Boone Cemetery Management Software May05-36 Greg Thede, Director, Boone Parks Department Dr. Kothari Joseph.
CYBERSIM Dec Client: Information Assurance Center Advisor: Dr. Doug Jacobson Group Members: Ryan ApplegateCprE Saddam KhattakCprE Dan NguyenCprE/JLMC.
Problem Statement Automotive and heavy equipment applications use sensors on machines to report temperatures, pressures, speeds, etc. to a central embedded.
Dec 0605 Team Leader Ryan Wiegel (Cpr E) Team Members Kyle Curran (Cpr E) Seth Gillespie (Cpr E) Carlos Ortiz (Cpr.
Attack Tool Repository and Player for ISEAGE May Team:Jeremy Brotherton Timothy Hilby Brett Mastbergen Jasen Stoeker Faculty Advisor:Doug Jacobson.
Team Members Team Members Tim Geiger Joe Hunsaker Kevin Kocher David May Advisor Dr. Juliet Hurtig November 8, 2001.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Abstract Introduction Project Requirements End Product Description Proposed Technical Approach Approach and Considerations Team Members: Travis Djuren.
Okalo Daniel Ikhena Dr. V. Z. Këpuska December 7, 2007.
Ames Community Schools (ACS) has been concerned with the performance of their students’ problem solving abilities on a nationally standardized exam. While.
Abstract Traffic accidents often occur when a major athletic event or concert is held at Iowa State University. This is a result of drivers not being able.
When buying a product in today’s marketplace, an individual is faced with the challenge of remembering an abundance of information about the product that.
Expert System Job Offer Evaluation Software May Abstract The project’s focus is to decide what criteria should be used to determine which job offer.
Center for Advanced Vehicular Systems Information System and Management Tool Matthew Denton Julie Sparkman Jon Yu Anshuman Ghai Matthew Denton Julie Sparkman.
A growing problem with university classrooms is the inability to effectively and efficiently record classroom attendance. The solution to this problem.
Network Enabled Wearable Sensors The Combined Research Curriculum Development (CRCD) project works with the Virtual Reality Applications Center (VRAC)
Abstract Evidence can be the key to convicting someone of a crime, or acquitting a person of charges brought against them. To make sure evidence is carefully.
Abstract Introduction End Product & Deliverables Resources Project Requirements Team Members: Faculty Advisors: Client: Team Members: Faculty Advisors:
Greater Des Moines Energy Center Combined Cycle Plant Diagram of a Combined Cycle Generator Abstract Combined-cycle generating units are being incorporated.
ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite.
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
Abstract Inexpensive ultrasonic tape measures are available that can only measure perpendicular distances to fairly large, flat surfaces. Complex environments.
May06-11: ISEAGE Attack Tool Repository and Player Jeremy Brotherton, Timothy Hilby, Brett Mastbergen, Jasen Stoeker.
Design Team : Advisor: Dr. Edwin Project Web Site: Client: Paul
D R A T D R A T ABSTRACT Every semester each department at Iowa State University has to assign its faculty members and teaching assistants (TAs) to the.
Introduction ProjectRequirements Project Requirements In a previous senior design project, a wireless front-end was added to Iowa State University’s Teradyne.
Internet Centralized K-12 Homework Assignment Capability May Client : Senior Design Team Ongo-08 Advisors : Dr. Thomas Daniels Dr. Yong Guan Team.
Abstract Reiman Gardens is looking to provide more educational material on their website. They are seeking a web program that provides an enjoyable experience.
Mathematical Teaching Software System Ames Community Schools (ACS) has been concerned with their student’s performance in problem-solving on nationally.
Abstract Due to a change in demand, high voltage transmission circuits can become overloaded. Overloads are resolved by the dispatch of power based on.
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
An essential part of any business is being able to track inventory and sales. In order for a business to be successful, the inventory control system must.
Abstract Parking your vehicle in the garage is a task that most of us take for granted. We head home from work or school, raise the garage door and drive.
Athletic Field Management System Faculty Advisors: John Lamont Ralph Patterson Tom Baird Project Client: Mary Beth Chinery Boone Area Recreation Department.
With many families on the road in today’s world, children are often left to entertain themselves. Parents would like to entertain them with something more.
Mathematical Teaching Software System Ames Community Schools (ACS) has been concerned with their student’s performance in problem-solving on nationally.
Globey’s World K-6 Teaching Application Support and Software Ongo-08b
Globey's World Abstract End-Product Description Technical Approach
Personnel Effort Budget
Computer Aided Software Engineering (CASE)
A Secure Wireless Interface between Personal Digital Assistants (PDAs)
Software Support Framework
Campus Locator – Definition Phase (May04-04)
Java Embedded Network Intrusion Security
ONGO-08 K-12 Teaching Application
Chair-Mounted Computer Workstation
Personnel Effort Budget
Globey’s World Ongo-08b Abstract End-Product Description Introduction
Ongo-08b: K – 12 Teaching Application Support
End-Product Description
Project Team Information
Automated Printed Circuit Board Development
Resources and Schedule
Globey's World Abstract Design Requirements Introduction
Project Team Information
Proposed Approach and Considerations
Presentation transcript:

Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As society moves further into the digital world, there has been growing concern for the security of the information stored on computers. Finding exploits to evaluate the security of a given system can be a daunting task. Those individuals wishing to test system security need a way to quickly locate relevant exploits and execute them. The May06-11 team will develop a solution that provides a user interface to a central repository of exploits, with the ability to search for, and then execute, specific exploits based on their characteristics. Faculty Advisor Dr. Doug Jacobson Team Members Jeremy Brotherton CprE Brett Mastbergen CprE Timothy Hilby CprE Jasen Stoeker CprE Introduction Project Requirements Resources and Schedules Problem Statement Need to locate and launch computer attacks Should be able to search one location for specific attacks Need simple, easy to use interface Problem Solution Develop web interface to single repository of attacks Users can search and launch attacks from one location Operating Environment The application will run on a set of computers on the ISEAGE network. Users Researchers, students, vendors, and computer professionals. Uses Evaluate the weaknesses in computer systems and network architectures Training users about the effects of various computer attacks Assumptions Maximum number of simultaneous users is twenty Maximum query response time is two seconds The application is being coded using PHP and MySQL Limitations The database will not include all possible attacks or all known attacks Disk usage is proportional to the size of the database This system will not fix vulnerabilities or pinpoint the cause of failure Expected End-Product MySQL database of attacks with a PHP based web front-end Documentation for database setup User’s guide and administrative troubleshooting guide Proposed Approach Research methods for developing web applications using databases Select the technologies for development and implement the application Test the software against client’s expectations Technologies Considered Sequel 2005 using ASP.NET MySQL using PHP Testing Considerations Full statement testing Black box testing from ISEAGE graduate students White box testing from team members Project Schedule Gantt Chart Personnel Efforts Financial Requirements Closing Summary With today’s rapid increase in computer technology the problem of computer security is rising. The ability to create defenses against potential security threats begins with gaining an understanding of how computer networks and computer technologies can be attacked and exploited. The Attack Tool Repository and Player, in conjunction with ISEAGE will provide the ability to quickly, locate and execute a large number of attacks and exploits. The proposed solution will include a web-based search engine capable of searching the attack database. Each attack entry will contain relevant attack information and documentation. This will be tied to a repository that will allow all attacks to be executed from their native platform. Design Objectives To develop a web application for searching a repository of attacks To provide a simple, easy to use interface for one-click launching of attacks To populate the database with an initial set of attacks and allow for future updates To offer the option to download attacks from the repository Functional Requirements Allows users search for and then launch attacks with the click of a button Administrative users will have the ability to add or remove items from the database Supplies users with standardized documentation about each exploit’s usage Ability to download attack code in order to launch an attack manually Design Constraints Software will be platform independent and web-based Users shall be able to launch attacks with a single click The database will contain a variety of attacks The system will not fix vulnerabilities Milestones Project definition End-product design Develop prototype Product testing by team and ISEAGE students Deliver end-product to the client Figure 1. Current prototype Client Information Assurance Center Figure 2. Basic solution architecture Homepage