Escolar Documentos
Profissional Documentos
Cultura Documentos
IN DISTRIBUTED ENVIRONMENT
USING DATA MINING TECHIQUES
PRAMOTH KUMAR. P.
S(110811104061)
Guided By
Mr. M. Iraniya Pandian
AP/CSE
EXISTING SYSTEM
The Intrusion Detection System (IDS) plays a vital
PROPOSED SYSTEM
It proposes the new method for controlling and
SYSTEM FEATURES
Misuse and Anomalyies Detection
Cont..
Detecting Denial Service Attack
SYSTEM ARCHITECTURE
MODULES
Server
Client
KDD Cup 99 Dataset
Hybrid Intrusion Detection System
Mitigate DOS Attack
Server
Server module is the main module for this project. This module acts
as the Intrusion Detection System. This module consists of four layers viz.
sensor layer (which detects the user/client etc.), Detection layer, alert
processing layer and reaction layer. In addition there is also Data Log,
where all the alerts and Data are stored for the references. This Data Log
can also be saved as Log file for future references for any network
environment.
Client
Client module is developed for testing the Intrusion Detection
System. In this module the client can enter only with a valid user name
and password. Then the client sends their requests to collect the data from
the server. In this case if the intruder is occurred then the client is using
the steps which are included below for destroying the intrusion.
RESULT
KDD Cup 99 data set has been used in this research
SOFTWARE USED
It works on the Operating System such as Windows XP.
Here Front End as Java, RMI, JDBC are the software
CONCLUSION
This
REFERENCES
1. Monowar H. Bhuyan,Bhattacaryya DK,Kalitha JK(2012), An effective
detection: current techniques and open issues, Elsevier Comput Electr Eng
38(5):106272.