Free Essay

Sniffer Technology for Detecting Lost Mobiles

In: Computers and Technology

Submitted By chamamanish
Words 651
Pages 3
A Technical Seminar Report
On
“Sniffer Technology For Detecting Lost Mobiles”
Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD (T.S)
In partial fulfilment of the requirement for the award of Degree of
BACHELOR OF TECHNOLOGY
In
“Computer Science and Engineering”
By
N.KIRTHI [11D61A0554]
Under the guidance of
Mr S.Srinivas
Associate Professor C.S.E Dept
.
Department of Computer Science and Engineering
RAJA MAHENDRA COLLEGE OF ENGINEERING AND TECHNOLOGY
(Affiliated to JNTU Hyderabad)
Ibrahimpatnam, Hyderabad-501506

RAJA MAHENDRA COLLEGE OF ENGINEERING
(Affiliated to JNTU Hyderabad)
Ibrahimpatnam, Hyderabad-501506

CERTIFICATE
This is to certify that the Technical seminar entitled “SNIFFER TECHNOLOGY FOR DETECTING LOST MOBILES” which is being submitted by N.KIRTHI(11D61A0554), in partial fulfillment for the award of degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING of JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, is a record of benefited work carried out by them under our supervision.

InternalGuide External Examiner Mr.S.Srinivas (Head of the department)

ACKNOWLEDGEMENT
The successful completion of any task would be incomplete without the mention of the people who made it possible through their constant guidance and encouragement crowns all the efforts with success.

Firstly we take the privilege to acknowledge Mrs. Vijaya Padma, Principal, Raja Mahendra College of Engineering, for her support in completion of this project.

We extend sincere thanks to Mr.S.Srinivas ,Head of Department, Computer Science and Engineering for his encouragement and constant support throughtout this project.

N.KIRTHI (11D61A0554)

ABSTRACT

The main scope of this paper is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost. Though effective way for the blocking of the lost mobile to prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of International Mobile Equipment Identifier (IMEI), there has been no development or very little progress for the detection of the misplaced mobile phone. For the detection of lost mobile SNIFFER plays a vital role .The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .The device can be called as a mobile Base station that includes Sniffer Base station, Unidirectional antenna, Tracking software. The sniffer is a small base station that includes transceiver section. It should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it acts as eyes for sniffer. The tracking software acts as database of lost mobiles. There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but this can be reduced using modern technologies and devices.

Our paper seems to be a bit costlier for initial setup, but this can be reduced when effectively and efficiently for the purpose of detection.

CONTENTS TITLE PAGE NO * CHAPTER 1 Introduction 1 * 1.1 Wireless Sniffing 1 * 1.2 Network Sniffing 2 * 1.3 Motivation 3 * CHAPTER 2 IMEI 5 * CHAPTER 3 Designing for the Sniffer 6 3.1 Sniffer base station 6 3.2 Design of unidirectional antenna 6 3.3 Software for tracking 9 * CHAPTER 4 Working of the Sniffer Device 10 * CHAPTER 5 Implementation 13 5.1 C Language 13 5.2 VISUAL BASIC 13 5.3 SQL 14 * CHAPTER 6 Future Enhancements and Conclusion 15 * CHAPTER 7 Appendix 16 CHAPTER 8 Bibliography 17

LIST OF FIGURES Page No;
Fig.2.1 IMEI Number on phone. 05
Fig.3.2 Unidirectional Antenna Radiation Pattern. 07
Fig.4.1 The intial network between the cellular n/w and lost mobiles. 10
Fig.4.2 Connection of the sniffer device with lost mobiles 12

Similar Documents

Premium Essay

Essentials of Management Information Systems

...organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these machines were being overwhelmed by malware (malicious software). Like any sports franchise, the Celtics are on the road a great deal of time during the playing season. Coaches, recruiters, and other staff members are at away games 40 or more times each season, using their mobile laptop computers to review plays and update the status of......

Words: 21009 - Pages: 85

Free Essay

Botnet Analysis and Detection

...Unfortunately, cybercrime is also on the rise with several forms of attack including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ........................................................................................................................................... i Acknowledgements .......................................................................................................................... ii Abstract ............................................................................................................................................... iii Table of Contents......

Words: 13171 - Pages: 53

Premium Essay

Mobile Computing

...ABSTRACT In the context of the rapid growth of mobile computing penetration in developing countries, mobile telephony is currently considered to be particularly important for such development. Yet, until recently, very little systematic evidence was available that shed light on the developmental impacts of mobile computing. The objective of this paper is to evaluate the problems and prospects of mobile computing in Nigeria. The paper will be analyzed by theme in order to provide a thematic overview as well as a comparative analysis of the development role of mobile computing. In exploring the evidence from completed projects as well as the foci of new projects, the paper summarizes and critically assesses the key findings and suggests possible avenues for future research. CHAPTER ONE INTRODUCTION The fusion of computer and telecommunication technologies has heralded the age of information superhighway over wire-line and wireless networks. Mobile cellular communication systems and wireless networking technologies are growing at an ever-faster rate, and this is likely to continue in the foreseeable future. Wireless technology is presently being used to link portable computer equipment to corporate distributed computing and other sources of necessary information. Wide-area cellular systems and wireless LANs promise to make integrated networks a reality and provide fully distributed and ubiquitous mobile communications, thus bringing an end to the tyranny of geography.......

Words: 8346 - Pages: 34

Premium Essay

Network Security

...corporate networks, is expanding exponentially every day. More and more communication is taking place via e-mail; mobile workers, telecommuters, and branch offices are using the Internet to remotely connect to their corporate networks; and commercial transactions completed over the Internet, via the World Wide Web, now account for large portions of corporate revenue. While the Internet has transformed and greatly improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats from which corporations must protect themselves. Although network attacks are presumably more serious when they are inflicted upon businesses that store sensitive data, such as personal medical or financial records, the consequences of attacks on any entity range from mildly inconvenient to completely debilitating—important data can be lost, privacy can be violated, and several hours, or even days, of network downtime can ensue. Despite the costly risks of potential security breaches, the Internet can be one of the safest means by which to conduct business. For example, giving credit card information to a telemarketer over the phone or a waiter in a restaurant can be more risky than submitting the information via a Web site, because electronic commerce transactions are usually protected by security technology. Waiters and telemarketers are not always monitored or trustworthy. Yet the fear of security problems can be......

Words: 3895 - Pages: 16

Premium Essay

Test

...Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology.......

Words: 18577 - Pages: 75

Premium Essay

Blackjacking Security

...book. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. To Cheryl, Nathan, and Noah: you fail only when you stop trying. Thanks for being there for me while I try. About the Author Daniel V. Hoffman began his security career while proudly serving his country as a decorated telecommunications specialist in the United States Coast Guard. He gained his operational experience by working his way up in the private sector from a system administrator to an IS manager, director of IS, and, ultimately, president of his own security-consulting company. He is currently a senior engineer for Fiberlink Communications Corporation, the recognized leader of mobile workforce security solutions. Dan is well-known for his live hacking demonstrations and online hacking videos, which have been featured by the Department of Homeland Security and included in the curriculum of various educational institutions. He regularly speaks at computer conferences and has been interviewed as a security expert by media outlets including Network World and Newsweek. Dan is also a regular columnist for http://ethicalhacker.net and holds many industry security certifications. Dan is a dedicated and loving father, husband, and son, who takes great pride in his family and realizes that nothing is more important than being there for his wife and children. In addition to his family, Dan enjoys politics, sports, music,......

Words: 83592 - Pages: 335

Premium Essay

Netwrk Security

...shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-176-8 Library of Congress Catalog Card Number: 00-050810 10 9 8 7 6 5 4 3 2 1 To my wife Anne and my daughter April About the Author John E. Canavan started his career in the IT field over 17 years ago working for Tymshare, Inc., a computer services and software company that created the Tymnet X.25 network. He is currently vice president for information systems and technology at Chevron FCU and......

Words: 95027 - Pages: 381

Premium Essay

Research

...Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions. Further permissions questions can be e-mailed to permissionrequest@cengage.com. Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers. Library of Congress Control Number: 2011942796 ISBN 13: 978-1-133-62646-6 ISBN 10: 1-133-62646-7 Instructor Edition: ISBN 13: 978-1-133-62721-0 ISBN 10: 1-133-62721-8 Course Technology 20 Channel Center Street Boston, MA 02210 USA Microsoft, the Office logo, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Course Technology, a part of Cengage......

Words: 234459 - Pages: 938

Premium Essay

Test Paper

...Comparing Detection and Prevention Controls Corrective Controls Deterrent Controls Compensating Controls Combining Control Types and Goals Comparing Physical Security Controls Comparing Door Access Systems Securing Door Access with Cipher Locks Securing Door Access with Proximity Cards Securing Door Access with Biometrics Identifying Users with ID Badges Tailgating Preventing Tailgating with Mantraps Increasing Physical Security with Guards Controlling Access with Access Lists and Logs Monitoring Areas with Video Surveillance Combining Fencing and Motion Detection Combining Proper Lighting and Motion Detection Combining Alarms and Motion Detection Securing Access with Barricades Using Signs Using Hardware Locks Securing Mobile Computers with Cable Locks Securing Servers with Locking Cabinets Securing Small Devices with a Safe Implementing Logical Access Controls Least Privilege Need to Know Group Policy Using a Password Policy Domain Password Policy Application Passwords Managing Accounts Disabling and Deleting Accounts Recovering Accounts Prohibiting Generic Accounts Restricting Access Based on Time-of-Day Expiring Accounts Reviewing Account Access Credential Management Comparing Access Control Models Role-Based Access Control Using Roles Based on Jobs and Functions Documenting Roles with a Matrix Establishing Access with Group-Based Privileges Rule-Based Access Control Discretionary Access Control SIDs and DACLs The......

Words: 125224 - Pages: 501

Premium Essay

Beacuse I Have to

...CHAPTER 13 – DETECTING AND RESPONDING TO IS INCIDENTS........... 206 CHAPTER 14 – PLANNING FOR BUSINESS CONTINUITY .......................... 217 CHAPTER 15 – INFORMATION TECHNOLOGY RISK MANAGEMENT ........ 222 Introduction for Statewide Information Security Manual The Statewide Information Security Manual is the foundation for information technology security in North Carolina. It sets out the standards required by G.S. §147-33.110, which directs the State Chief Information Officer (State CIO) to establish a statewide set of standards for information technology security to maximize the functionality, security, and interoperability of the State’s distributed information technology assets. These standards apply to all public agencies, their agents or designees subject to G.S. §147-33.110 and G.S. §147-33.113, Use by local governments, LEAs, community colleges, constituent institutions of the University of North Carolina and other public agencies is encouraged to the extent allowed by law. The Manual is based on industry best practices and follows the International Organization for Standardization Standard 27002 (ISO 27002) for information technology security framework, and incorporates references to the National Institute of Standards and Technology (NIST) and other relevant standards. The statewide security standards have been extensively reviewed by representatives of each agency within the executive branch of state government and are continuously reviewed as technology......

Words: 65255 - Pages: 262

Premium Essay

Sscp Study Notes

...management. These tools can all be used to verify the integrity of both production and development files/software and help ensure that the organization does not suffer an outage because of bad changes (i.e. changes planned correctly but implemented with flaws because of, for example, corrupt files.). They can also help create "golden images" of production data/configurations. It is important to enforce the change control / configuration management process. Some tools for detecting violations are: NetIQ, PentaSafe, PoliVec and Tripwire. These tools offer solutions for monitoring the configuration of systems and alerting on out-of-course changes. 2.10 Policy, Standard, Guidelines, Baselines Security Policy Is a general statement written by senior management to dictate what type of role security plays within the organization - it also provides scope and direction for all further security. Standards Specifies how hardware/software products are to be used. Provide a means to ensure that specific technology, applications, parameters and procedures are carried out in a uniform way. These rules are usually compulsory within a company and they need to be enforced. Baselines Provides the minimum level of security necessary throughout the organization. Guidelines Are recommended actions and operational guides when a specific standard does not apply. Procedures Are step-by-step actions to achieve a certain task. 2.11 Roles and Responsibilities Senior......

Words: 17808 - Pages: 72

Free Essay

Tjmax

...payouts
from
court‐imposed
restitution,
legal
fees,
and
more.
The
firm
estimated
that
it
 spent
more
than
$150
million
to
correct
security
problems
and
settle
with
consumers
 affected
by
the
breach,
and
that
was
just
the
tip
of
the
iceberg.

Estimates
peg
TJX’s
overall
 losses
from
this
incident
at
between
$1.35
billion
and
$4.5
billion3.
 
 A
number
of
factors
led
to
and
amplified
the
severity
of
the
TJX
breach.

There
was
a
 personnel
betrayal:
The
mastermind
was
an
alleged
FBI
informant
who
previously
helped
 bring
down
a
massive
credit
card
theft
scheme,
but
then
double‐crossed
the
feds
and
used
 insider
information
to
help
his
gang
outsmart
the
law
and
carry
out
subsequent
hacks4.

 There
was
a
technology
lapse:
TJX
made
itself
an
easy
mark
by
using
WEP,
a
wireless
 security
technology
less
secure
than
the
stuff
many
consumers
use
in
their
homes
–
one
 known
for
years
to
be
trivially
compromised
by
the
kind
of
‘drive‐by’
hacking
initiated
by
 the
perpetrators.

And
there
was
a
procedural
gaffe:
Retailers
were
in
the
process
of
rolling
 out
a
security
rubric
known
as
The
Payment
Card
Industry
Data
Security
Standard,
 























































 1

Particular
thanks
goes
to
my
BC
colleague,
Prof.
Sam
Ransbotham,
whose
advice,
guidance,
and
suggestions
 were
invaluable
in
creating
this
chapter.

Any
errors
or
omissions
are
entirely
my
own.
 2
King,
2009
 3
Matwyshyn
2009
 4
Goldman,
2009
 Gallaugher
–
Information
Security......

Words: 15885 - Pages: 64

Premium Essay

Security Analyst

...Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions 8. Chapter 6: Enumeration of Services 3 1. A Quick Review 2. What Is Enumeration? 3. Windows Basics 4. Enumeration with SNMP 5. Unix and Linux Enumeration 6. LDAP and Directory Service Enumeration 7. Enumeration Using NTP 8. SMTP Enumeration 9. Using EXPN 10. Using RCPT TO 11. SMTP Relay 12. Summary 13. Exam Essentials 14. Review Questions 9. Chapter 7: Gaining Access to a System 1. Up to This Point 2. Summary 3. Exam Essentials 4. Review Questions 10. Chapter 8: Trojans, Viruses, Worms, and Covert Channels 1. Malware 2. Overt and Covert Channels 3. Summary 4. Exam Essentials 5. Review Questions 11. Chapter 9: Sniffers 1. Understanding Sniffers 2. Using a Sniffer 3. Switched Network Sniffing 4. Exam Essentials 5. Summary 6. Review Questions 4 12. Chapter 10: Social Engineering 1. What Is Social Engineering? 2. What Is Social Networking? 3. Commonly Employed Threats 4. Identity Theft 5. Summary 6. Exam Essentials 7. Review Questions 13. Chapter 11: Denial of Service 1. Understanding DoS 2. Understanding DDoS 3. DoS Tools 4. DDoS Tools 5. DoS Defensive Strategies 6. DoS Pen Testing Considerations 7. Summary 8. Exam Essentials 9. Review Questions 14. Chapter 12: Session Hijacking 1. Understanding Session Hijacking 2. Exploring Defensive Strategies 3. Summary 4. Exam Essentials 5. Review Questions 15. Chapter 13: Web Servers and Web Applications 1. Exploring the......

Words: 71242 - Pages: 285

Premium Essay

Information and Survey Analysis

...audit staff. C. staff will be exposed to a variety of technologies. D. resources are allocated to the s of highest concern. The correct answer is: D. resources are allocated to the s of highest concern. Explanation: The risk-based approach is designed to ensure audit time is spent on the s of highest risk. The development of an audit schedule is not addressed by a risk-based approach. Audit schedules may be prepared months in advance using various scheduling methods. A risk approach does not have a direct correlation to the audit staff meeting time budgets on a particular audit, nor does it necessarily mean a wider variety of audits will be performed in a given year. 8. The PRIMARY objective of an IS audit function is to: A. determine whether everyone uses IS resources according to their job description. B. determine whether information systems safeguard assets and maintain data integrity. C. examine books of accounts and relative documentary evidence for the computerized system. D. determine the ability of the organization to detect fraud. The correct answer is: B. determine whether information systems safeguard assets and maintain data integrity. Explanation: The primary reason for conducting IS audits is to determine whether a system safeguards assets and maintains data integrity. Examining books of accounts is one of the processes involved in IS audit, but it is not the primary purpose. Detecting frauds could be a result of an IS audit but......

Words: 97238 - Pages: 389

Free Essay

Is4550 Unit 3 Assignment 1

...                   1       Introduction   .....................................................................................................................................................................  3   CSC  1:    Inventory  of  Authorized  and  Unauthorized  Devices  ............................................................................  8   CSC  2:    Inventory  of  Authorized  and  Unauthorized  Software  .......................................................................  14   CSC  3:    Secure  Configurations  for  Hardware  and  Software  on  Mobile  Devices,  Laptops,   Workstations,  and  Servers  .......................................................................................................................................  19   CSC  4:    Continuous  Vulnerability  Assessment  and  Remediation  .................................................................  27   CSC  5:    Malware  Defenses  ..........................................................................................................................................  33   CSC  6:    Application  Software  Security  ....................................................................................................

Words: 31673 - Pages: 127