Implement the appropriate classification method

Assignment Help Computer Networking
Reference no: EM131011114

Network Analysis and Java IDS development

Computing case study with two tasks. Task 1 is analyse a pcap file and identify what causing the incident. Task 2 is develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

Part1

Task 1

The initial report from the IT department was that many machines were reported to slow down and most of the communications in the network were degraded.

What you must do

Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.

Part 2

Task 2

You are hired to create such an IDS, using two datasets that are provided to you from the company IT department. These datasets are from a different subnetwork of the company and contain different IP addresses from the Pcap file. The first dataset contains normal traffic and the second contains different kinds of attacks. Your IDS must be able to detect as many attacks as possible and report them in a human readable form.

You are advised to use javaml-0.1.7 library steps:

1. Analyse the malicious traffic data in order to understand the different attacks that exist (Have in mind that you have been provided with CSV data that contain only basic features of the packets).

2. Pre-process the data and extract the useful features.

3. The malicious dataset does not contain labels on data. Use a OCSVMclassification technique as it does not need labelled data .

4. Implement the appropriate classification method.

5. Train the method using the normal or the malicious depending on the methods you have chosen.

6. Create a reporting class that can create proper outcomes (e.g. XML, txt or IDMEF files)

Extra notes
• OCSVM- as the dataset is not labeled
• The data needs to be transformed into a ocsvm ready format before processing.
• Significant features that are required for analysis must be set. In options.
• Information regard

The specification ha been given and can be uploaded upon request.

The OCSVM classification has been provided simply edit it the parameters such as path of training dataset. The features that it should effectively use for training and the xml result it should return.

Reference no: EM131011114

Questions Cloud

Compare three leading erp systems to each other : Do some original research and compare three leading ERP systems to each other. Write a four page paper that compares their features?
Describe in words how the population would behave : Indicate which equilibria are stable and which are unstable, and check via the slope criterion for stability. Describe in words how the population would behave.
What are the gender-related role differences : What are the gender-related role differences in:Friendship building and maintenance over the life span? Romantic love and dating? Marriage and committed relationships
Supplier offers trade credit terms : Mr. Hugh Warner is a very cautious businessman. His supplier offers trade credit terms of /15,net85. Mr. Warner never takes the discount offered, but he pays his suppliers in 75 days rather than the 85 days allowed so he is sure the payments are neve..
Implement the appropriate classification method : Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.
Program-measure running time of different sorting algorithms : Write a JAVA program that measures the running time of different sorting algorithms such as heap sort, in-place quick sort and merge sort for 10,000 randomly generated integer numbers.
How fast is the surface area changing at the given instant : How fast is the radius changing at the instant when the radius is 4 inches? How fast is the surface area changing at the same instant?
Find the length of the curve between the given two points : Consider the path r(t)=(6t,3t2,3lnt) defined for t>0. Find the length of the curve between the points (6,3,0) and (12,12,3ln(2)).
Describe the fallacy in your own words : Please read and understood all 44 "Dirty Tricks", explaining on pages 19-37 of "The Thinker's Guide to Fallacies". Describe the fallacy in your own words (not copied from the book). Explain where in the speech you have detected this fallacy

Reviews

Write a Review

Computer Networking Questions & Answers

  The interconnections between network devices

The interconnections between network devices and The Internet cloud, generically, to represent your network's interface to the Internet

  Discussion about networking a small business

Assume you have been employed as a consultant to suggest a retailing corporation about ways in which it can use networking technology to enhance its business.

  Perform a traceroute between the source and destination on

perform a traceroute between source and destination on the same continent at three different hours of the day.a. find

  How internet works for organization-s office administration

What would be needed along with precautionary measures, and an overview of how the Internet works for the organization's office administration.

  What is a tool available for performance monitoring

Monitoring a network is beneficial in many ways. One main benefit is that it helps keep the performance of a network in check. For your assignment, complete the following: What is a tool available for performance monitoring

  Explain internet and the world wide web

Explain how the Internet and the World Wide Web have evolved over the years and disrupted traditional ways of doing business.

  Q1 explain clientserver architecture including fat and thin

q1. explain clientserver architecture including fat and thin clients middleware and clientserver tiers.q2. make use of

  Establish a wan connectivity between two offices

establish a WAN connectivity between your local offices across town.

  Define network convergence

Which protocol is used by PING? List the names of two PING messages - define network convergence. How can you identify your configured network has reached convergence?

  Advantage of deterministic local area network protocol

State the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol.Give a real-life example of this advantage.

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  What are congestion window size after a period of time

Iif both C1 and C2 at time t0 have congestion window of 10 segments what are their congestion window size after 2200 msec

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd