Implement the appropriate classification method

Assignment Help Computer Networking
Reference no: EM131011114

Network Analysis and Java IDS development

Computing case study with two tasks. Task 1 is analyse a pcap file and identify what causing the incident. Task 2 is develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

Part1

Task 1

The initial report from the IT department was that many machines were reported to slow down and most of the communications in the network were degraded.

What you must do

Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.

Part 2

Task 2

You are hired to create such an IDS, using two datasets that are provided to you from the company IT department. These datasets are from a different subnetwork of the company and contain different IP addresses from the Pcap file. The first dataset contains normal traffic and the second contains different kinds of attacks. Your IDS must be able to detect as many attacks as possible and report them in a human readable form.

You are advised to use javaml-0.1.7 library steps:

1. Analyse the malicious traffic data in order to understand the different attacks that exist (Have in mind that you have been provided with CSV data that contain only basic features of the packets).

2. Pre-process the data and extract the useful features.

3. The malicious dataset does not contain labels on data. Use a OCSVMclassification technique as it does not need labelled data .

4. Implement the appropriate classification method.

5. Train the method using the normal or the malicious depending on the methods you have chosen.

6. Create a reporting class that can create proper outcomes (e.g. XML, txt or IDMEF files)

Extra notes
• OCSVM- as the dataset is not labeled
• The data needs to be transformed into a ocsvm ready format before processing.
• Significant features that are required for analysis must be set. In options.
• Information regard

The specification ha been given and can be uploaded upon request.

The OCSVM classification has been provided simply edit it the parameters such as path of training dataset. The features that it should effectively use for training and the xml result it should return.

Reference no: EM131011114

Questions Cloud

Compare three leading erp systems to each other : Do some original research and compare three leading ERP systems to each other. Write a four page paper that compares their features?
Describe in words how the population would behave : Indicate which equilibria are stable and which are unstable, and check via the slope criterion for stability. Describe in words how the population would behave.
What are the gender-related role differences : What are the gender-related role differences in:Friendship building and maintenance over the life span? Romantic love and dating? Marriage and committed relationships
Supplier offers trade credit terms : Mr. Hugh Warner is a very cautious businessman. His supplier offers trade credit terms of /15,net85. Mr. Warner never takes the discount offered, but he pays his suppliers in 75 days rather than the 85 days allowed so he is sure the payments are neve..
Implement the appropriate classification method : Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.
Program-measure running time of different sorting algorithms : Write a JAVA program that measures the running time of different sorting algorithms such as heap sort, in-place quick sort and merge sort for 10,000 randomly generated integer numbers.
How fast is the surface area changing at the given instant : How fast is the radius changing at the instant when the radius is 4 inches? How fast is the surface area changing at the same instant?
Find the length of the curve between the given two points : Consider the path r(t)=(6t,3t2,3lnt) defined for t>0. Find the length of the curve between the points (6,3,0) and (12,12,3ln(2)).
Describe the fallacy in your own words : Please read and understood all 44 "Dirty Tricks", explaining on pages 19-37 of "The Thinker's Guide to Fallacies". Describe the fallacy in your own words (not copied from the book). Explain where in the speech you have detected this fallacy

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd