Sample+1

=Group Members: Ang Ray Yan (Leader), Yuan YuChuan, Lee Han Cheng= =External Advisor: Mr Tan Jia Qi=

In Information technology, packets are used to transfer information like bytes, characters and bits. However, packets can be intercepted or sniffed by packet sniffing techniques. A packet sniffing program monitors all the incoming and outcoming traffic of packets and intercepts it, something like a wiretap in a phone. It may be used in a good way, for network monitoring, or debugging. Unfortunately, people with bad intentions can acquire sensitive information in packets like passwords or company orders. Even if the information contained is encrypted, there may be still a chance that it can be decrypted using brute force or a plaintext attack. Thus, it is a security threat to both the individual and corporations.
 * __Problem description:__**

Render the technique of packet sniffing useless when dealing with the sending of sensitive information.
 * __Aim:__**

The following diagram shows how hackers are able to obtain vital information via packet sniffing: Assuming that the message is “ab” and E(string) = encrypted text of string
 * __Proposed Solution:__**



Our plan is to have multiple packets sent at the same time through different paths from the sender to the receiver. It is much harder for the attacker to intercept multiple packets at the same time, thus minimizing the chance of the information being sniffed completely since the attacker can only get part of the information (getting only ‘a’ instead of ‘a’ and ‘b’ in the example below). The following diagram explains about the plan:

__**Literature Review**__




 * __Proposed Timeline:__**

T1W6: - Completion of Literature Review and DS Proposal (hence the above might be modified slightly) T1W7: - Inform mentor to see further steps to be taken T1W8 to Prelims: - Prepare preliminary round presentation/etc. Set up the environment (simulator or real computers) for the intercepting of messages. Prelims to Middle of Term 2: - Implement the environment to prevent the hacker from getting the message - Begin on the writing of the research paper Middle of Term 2 to semi-finals: - Continue writing and begin to wrap up the research paper before semi-finals. - Obtain results (e.g. number of packets recovered by hacker, encryption/decryption time etc..., to be confirmed) - Convert relevant parts of the research paper and results obtained thus far into the web report. Semi-finals to finals: - Obtain any remaining required results for our research - Make conclusions based on results found. - Finish and refine the research paper. - Complete the web report of our research.