Hidden Msg 05 from the top, 03 from the left !


Links

Website Preview

Search Engines

Google Yahoo! Lycos Metacrawler

E-Mail

Cebridge Yahoo! Mail Fairmont State University America Online GMail


Shopping Website Preview

Online Shopping

Ebay Amazon TigerDirect Crucial PriceWatch

Rental Sites

Netflix Gamefly Gamerang Wal-mart

Downloads

IsoHunt Download.com

Coding Tutorials

Warebiz Programming

Various

My First Website GameFAQs

Funny Stuff

Penny-Arcade RPG World Ebaums World Nuklear Power

Job Services

Monster
Hot Jobs CareerBuilder Top USA Jobs


Back Home
Back to the Programming Page

AWARE

The Project

     AWARE, aka A Windows Attack intRusion Emulator, is a project I worked on over the summer of 2004. I worked with a team of three other students, Michael Ware, Travis Woods, and David Knight and under the supervision of Professor Don Tobin.

     The purpose of the project is to train the modern computer user how to detect suspicious activity on their computer using the tools provided by Microsoft. A potential use of AWARE would be training employees at a company how to fix their own computer without resorting to bringing in outside help.

Some Background Info

     The project was based on an idea Professor Tobin had been thinking up for a while. He supervised another team during the Spring semester of 2004 which I was also on. Our job in this team was to investigate the footprints left behind by several different viruses. We collected data on many specific viruses and used this information to determine where to look for suspicious activity on a Windows XP machine.

The Design

     After much deliberating we all decided to do the project in C# and the database of attacks would be stored in an XML file. Only one member of the team had ever worked with C# before and none of us had experience with XML. Yet, in one month we had a working prototype up and running.

     We stuck very close to the original design of the project. The attack footprint would be entered into a Data Entry Form and then saved to the XML file. Once the XML file is populated with attacks, the simulation can be activated. Upon entering the simulation, the user would need to make use of all the tools available to locate and remove all traces of the attack. Once completed the user would shutdown the simulation and be evaluated on his/her performance.

AWARE In Action

     At startup, the user can decide whether to enter more attacks into the database, run the simulation, or view a tutorial on the tools used in the simulation. When the user decides to run the simulation, there are two options, a specific attack can be generated or a random one may be selected. Once an attack is generated the simulation starts up and the footprint is injected into the simulation. From here the user must use the tools such as Task Manager, Windows Explorer, Services.msc, Registry Editor, Netstat, and others to locate all traces of the attack and eliminate them. Upon completion the user will shutdown the simulation and be immediately taken to an evaluation screen which tells the user which modifications were recognized, which were missed, and which were made that had nothing to do with the attack.

The Inner-Workings of AWARE

     XML files were used to store not just the database of attacks, but also a backup of the registry, file system, services, port information, processes, and a few others. The information stored in these XML files are what we use in the simulation to protect the user from inadvertently making changes to the information on the computer running the simulation. Upon startup, all the information is loaded into memory and the user can then remove whatever he/she chooses without making changes to either the system's information or the information stored in the XML files.

     When the user generates an attack, the attack footprint information is pulled from the XML file and placed into one object which goes to the simulation and is dispersed into the necessary locations. The footprint elements are then "hidden" within the simulation and the user must remove said elements. As these elements (and even those having nothing to do with the attack) are removed, a note is made in yet another XML file entitled UserCleanup. Once the user shuts down the simulator, all the changes the user made are restored from this XML file and displayed to the user as well as the changes the user didn't yet should have made.

More AWARE Info to Come!