Skip to content

TOEYJIRAKID/Attack-Analytics-Dashboard

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🚀 Project Name :

PoD Attack Analytics – Ping of Death Attack Analytics Dashboard

📌 Project Overview :

Ping of Death Attack Analytics Dashboard is a web application designed to log and display information about Ping of Death (PoD) attacks on a network. This application helps users monitor basic details of potentially malicious packets and presents the data in an easy-to-understand format.

🙏 Project Overview :

  • 64102122 จิรภัทร จิตรภักดี
  • 64102080 จิรกิตติ์ เอียดเหตุ
  • 64104532 ณัฐนันท์ ทองมาก
  • 64125354 ภีรภัทร บุญสุวรรณ
  • 64125735 ธนวัฒน์ กองสีสังข์
  • 64110455 ภัครศักดิ์ ผลสนอง

🎯 Objective :

  • Develop a system to log packet data related to PoD attacks.
  • Display basic packet information such as source IP, destination IP, and protocol.
  • Create a dashboard that helps users analyze trends of abnormal packets.

Key Features :

  • Basic Packet Logging – Records packet data that may be associated with Ping of Death attacks.
  • Simple Data Visualization – Displays data in tables or basic graphs.
  • Minimalistic Dashboard – A simple interface for reviewing basic attack data.

📂 GitHub Repository (Source Code) :

🛠 Ping of Death Attack Command :

To simulate a Ping of Death attack and test your system's detection capabilities, use the following command:

sudo hping3 --icmp --flood --spoof <spoofed_ip> <target_ip>

This command floods the target with malformed ICMP packets, mimicking a Ping of Death attack, allowing you to test how well your system can detect and log the attack.

🏛️ Database Structure :

The system logs key attack parameters to help security teams analyze attack trends:

# Attribute Description Data Type
1 src Source IP of the attack String
2 dst Destination IP of the attack String
3 proto Protocol used (ICMP) String
4 attack_type Type of attack (Ping of Death) String
5 timestamp Time when attack was detected String
6 ttl Time-to-Live (TTL) value in the packet Integer
7 mac_src MAC address of the attack source String
8 mac_dst MAC address of the destination String

📃 Example JSON Data :

The following is an example of the structured data logged by the Ping of Death Attack Analytics System:

{
    "input_interface": "wlp2s0",
    "code": "0",
    "dst": "172.28.1.60",
    "attack_type": "Ping of Death",
    "src": "172.28.1.63",
    "type": "8",
    "ttl": "64",
    "tags": [],
    "hostname": "itd-Macmini8",
    "@timestamp": "2024-04-07T11:42:54.570Z",
    "len": "28",
    "prec": "0x00",
    "port": 35324,
    "proto": "ICMP",
    "@version": "1",
    "host": "172.18.0.1",
    "mac_dst": "dc:a4:ca:e9:a6:db",
    "mac_src": "70:9c:d1:84:a0:df",
    "tos": "0x00",
    "id": [
        "3608",
        "25180"
    ],
    "seq": "512",
    "timestamp": "Apr  7 18:42:54"
}

📽️ Project Preview :

PoD Attack Analytics