New Mexico Supercomputing Challenge

What is the Success Rate of a Hacker Getting Past Anti-virus Software

Team: 32

School: Jackson Middle School

Area of Science: Computer Science

Interim: Team Number: 32
School name: Jackson Middle School
Area: Computer Science
Project Title: What is the Success Rate of a Hacker Getting Past Anti-virus Software

Definition: The success a of a person getting through multiple security levels to eventually break into the system and take critical system files that could make or break a program or project.

Plan: Our team has been investigating what the odds of a “cracker” getting through software. We have been researching and applying our knowledge to Netlogo, from the models library. We found that our original plan did not make sense, so we changed the idea of what we were going to do, to how a “cracker” can hack into a computer and how it can be prevented.

Results that we expect: We expect to make a program that has the best protection against hackers that are trying to break into the computer. One possibility is to combine multiple systems into a program that will try to block a hacker getting into the computer system and taking the critical files that would render the parts of the program, or work that a person has placed in a useless folder. We hope that they are only able to get the files about 10% of the time. We hope for a 90% unsuccessful rate because it is a high standard that we hope to set. We will also be satisfied if they are only able to get through about 30% of the time because it would still be a low unsuccessful rate 70%.

We have found what we have the pages of research and we know what ant-viruses we will use. The programing is coming along. We started with the Ants Model and we have fixed the model to simulate the ants as crackers. This will help us show the success rate of the crackers and we will have more simulations of ant-viruses. The food has been adjusted so that we know where exactly the food will be. We are going to try to find a way to scatter the food and record the exact location and the movement of the ants (and have the found the food). The research is coming along and we have terms that the Kickoff scientists told us. We have the meaning to Honey pots, Intrusion detection System, TCP cookie Transactions, TCP, packets and SYN cookie protection.

Team members: Nicholas Elkins, Quentin Dye, Micah Carlen.
Sponsor Teacher: Karen Glennon
Mentor: Neale Pickett, Jed Crandall

Brian, Marshall. “HowInternetCookisWork” 26 April 2000. 01 December 2014

Ferro,Greg.”TCP SYN Cookie - DDOS Defence,” Etherealmind.Gre Ferro,n.d. Web. 01 Dec. 2014

Honeypot.”What Is ? Quinstreet Enterprise”,n.d. Web. 01 Dec. D014

“Intrusion Detection FAQ: What Is a Honeypot?” SANS, n.d. Web. 01 Dec.

Valentin,Vishnu V. “5 steps Wi-Fi Hacking-Cracking WPA2 Passowrds Ethical Hacking Tutorials, Tips and Tricks” Ethical Hacking Tutorial,n.d. Web. 10 Dec. 2014

Williams, R., & Cummings, S. (1993). Jargon: An informal dictionary of computer terms. Berkeley, CA: Peachpit Press.

Erickson, J. (2008). Hacking the art of exploitation (2nd ed.). San Francisco, Calif.: No Starch Press.

Team Members:

  Nicholas Elkins
  Quentin Dye
  Micah Carlen

Sponsoring Teacher: Karen Glennon

Mail the entire Team

For questions about the Supercomputing Challenge, a 501(c)3 organization, contact us at: consult1415 @

New Mexico Supercomputing Challenge, Inc.
Post Office Box 30102
Albuquerque, New Mexico 87190
(505) 667-2864

Supercomputing Challenge Board of Directors
Board page listing meetings and agendas
If you have volunteered for the Challenge, please fill out our In Kind form.
Flag Counter

Tweet #SupercomputingChallenge