He also said that he didn't get the Money from ITAC but they send a confirmation fax to our faculty. We should get the check soon.
We also talked about our project concepts. He changed it a little bit because of time limitation.
Instead of developing a switch with multiple ethernet ports, we will use the available ethernet port to detect layer2 attack and use another port to control 3rd party switch/router to drop the attacking port.The sequence should be:
- Analyze traffic
- Detect layer 2 attack. ex. ARP attack
- Send command to switch/router console interface to close the attacker port.
- go to 1
Dr. Wael also suggested to build a (Command line interface) for the OES to control, configure and use. This should be simple as SSH.
For any discussion, use our mailing list.
BISO
No comments:
Post a Comment