Implement the appropriate classification method

Assignment Help Computer Networking
Reference no: EM131011114

Network Analysis and Java IDS development

Computing case study with two tasks. Task 1 is analyse a pcap file and identify what causing the incident. Task 2 is develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

Part1

Task 1

The initial report from the IT department was that many machines were reported to slow down and most of the communications in the network were degraded.

What you must do

Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.

Part 2

Task 2

You are hired to create such an IDS, using two datasets that are provided to you from the company IT department. These datasets are from a different subnetwork of the company and contain different IP addresses from the Pcap file. The first dataset contains normal traffic and the second contains different kinds of attacks. Your IDS must be able to detect as many attacks as possible and report them in a human readable form.

You are advised to use javaml-0.1.7 library steps:

1. Analyse the malicious traffic data in order to understand the different attacks that exist (Have in mind that you have been provided with CSV data that contain only basic features of the packets).

2. Pre-process the data and extract the useful features.

3. The malicious dataset does not contain labels on data. Use a OCSVMclassification technique as it does not need labelled data .

4. Implement the appropriate classification method.

5. Train the method using the normal or the malicious depending on the methods you have chosen.

6. Create a reporting class that can create proper outcomes (e.g. XML, txt or IDMEF files)

Extra notes
• OCSVM- as the dataset is not labeled
• The data needs to be transformed into a ocsvm ready format before processing.
• Significant features that are required for analysis must be set. In options.
• Information regard

The specification ha been given and can be uploaded upon request.

The OCSVM classification has been provided simply edit it the parameters such as path of training dataset. The features that it should effectively use for training and the xml result it should return.

Reference no: EM131011114

Questions Cloud

Compare three leading erp systems to each other : Do some original research and compare three leading ERP systems to each other. Write a four page paper that compares their features?
Describe in words how the population would behave : Indicate which equilibria are stable and which are unstable, and check via the slope criterion for stability. Describe in words how the population would behave.
What are the gender-related role differences : What are the gender-related role differences in:Friendship building and maintenance over the life span? Romantic love and dating? Marriage and committed relationships
Supplier offers trade credit terms : Mr. Hugh Warner is a very cautious businessman. His supplier offers trade credit terms of /15,net85. Mr. Warner never takes the discount offered, but he pays his suppliers in 75 days rather than the 85 days allowed so he is sure the payments are neve..
Implement the appropriate classification method : Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.
Program-measure running time of different sorting algorithms : Write a JAVA program that measures the running time of different sorting algorithms such as heap sort, in-place quick sort and merge sort for 10,000 randomly generated integer numbers.
How fast is the surface area changing at the given instant : How fast is the radius changing at the instant when the radius is 4 inches? How fast is the surface area changing at the same instant?
Find the length of the curve between the given two points : Consider the path r(t)=(6t,3t2,3lnt) defined for t>0. Find the length of the curve between the points (6,3,0) and (12,12,3ln(2)).
Describe the fallacy in your own words : Please read and understood all 44 "Dirty Tricks", explaining on pages 19-37 of "The Thinker's Guide to Fallacies". Describe the fallacy in your own words (not copied from the book). Explain where in the speech you have detected this fallacy

Reviews

Write a Review

Computer Networking Questions & Answers

  Identify three styles of switching from user mode

Describe the advantages of using a MMU (memory management unit) that incorporates segmentation and paging over ones that either use pure paging or pure segmentation.

  Network servers and resources in networked business office

What kinds of business applications would you deem significant in the networked business office? What kinds of network servers and resources.

  Find the largest number of nodes

Find the largest number of nodes that can be activated in the end by selecting only one node into the seed set

  Find national strategy for physical protection of critical

from ancient drum beats to e-mail methods of communications have progressed astronomically. however no matter the

  Current network diagram infrastructure

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

  List five companies that provide p2p file-sharing services

List five companies that provide P2P file-sharing services. Identify what types of files P2P file-sharing services can deliver, and if there are different approaches for different file types.

  Relevant remote access applications

For this assignment, submit your initial post addressing the topics below. Continue to follow your classmates' posts for the remainder of the week and post at least one to two follow-up messages to your classmates' posts prior to midnight ET on Su..

  Assume a dual-railed system

(Multiplexers) Assume a dual-railed system, where you have access to any vari- able and its complement. Implement the following four-input Boolean function as indicated in each of the following subsections.

  Defines minimum packet size network technology to allow ip

Although not explicity stated, the Internet Protocol(IP) specification,RFC 791, defines the minimum packet size a network technology must support to allow IP to run over it. Discuss the reasons for adopting that specific value.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Discuss the possibility of setting up a wireless network

Imagine you are a wireless network contractor and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building.

  Explain ssl-based vpns and client-based vpns

Compare and contrast the differences between SSL-based VPNs and client-based VPNs. Describe cost benefits, ease of use, ease of management, ease of implementation, and scalability of each.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd