Implement the appropriate classification method

Assignment Help Computer Networking
Reference no: EM131011114

Network Analysis and Java IDS development

Computing case study with two tasks. Task 1 is analyse a pcap file and identify what causing the incident. Task 2 is develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

Part1

Task 1

The initial report from the IT department was that many machines were reported to slow down and most of the communications in the network were degraded.

What you must do

Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.

Part 2

Task 2

You are hired to create such an IDS, using two datasets that are provided to you from the company IT department. These datasets are from a different subnetwork of the company and contain different IP addresses from the Pcap file. The first dataset contains normal traffic and the second contains different kinds of attacks. Your IDS must be able to detect as many attacks as possible and report them in a human readable form.

You are advised to use javaml-0.1.7 library steps:

1. Analyse the malicious traffic data in order to understand the different attacks that exist (Have in mind that you have been provided with CSV data that contain only basic features of the packets).

2. Pre-process the data and extract the useful features.

3. The malicious dataset does not contain labels on data. Use a OCSVMclassification technique as it does not need labelled data .

4. Implement the appropriate classification method.

5. Train the method using the normal or the malicious depending on the methods you have chosen.

6. Create a reporting class that can create proper outcomes (e.g. XML, txt or IDMEF files)

Extra notes
• OCSVM- as the dataset is not labeled
• The data needs to be transformed into a ocsvm ready format before processing.
• Significant features that are required for analysis must be set. In options.
• Information regard

The specification ha been given and can be uploaded upon request.

The OCSVM classification has been provided simply edit it the parameters such as path of training dataset. The features that it should effectively use for training and the xml result it should return.

Reference no: EM131011114

Questions Cloud

Compare three leading erp systems to each other : Do some original research and compare three leading ERP systems to each other. Write a four page paper that compares their features?
Describe in words how the population would behave : Indicate which equilibria are stable and which are unstable, and check via the slope criterion for stability. Describe in words how the population would behave.
What are the gender-related role differences : What are the gender-related role differences in:Friendship building and maintenance over the life span? Romantic love and dating? Marriage and committed relationships
Supplier offers trade credit terms : Mr. Hugh Warner is a very cautious businessman. His supplier offers trade credit terms of /15,net85. Mr. Warner never takes the discount offered, but he pays his suppliers in 75 days rather than the 85 days allowed so he is sure the payments are neve..
Implement the appropriate classification method : Analsyse the pcap file that has been made available to provide probable cause of the symptoms may be (within your expertise ) and make recommendations to prevent this from reoccuring.
Program-measure running time of different sorting algorithms : Write a JAVA program that measures the running time of different sorting algorithms such as heap sort, in-place quick sort and merge sort for 10,000 randomly generated integer numbers.
How fast is the surface area changing at the given instant : How fast is the radius changing at the instant when the radius is 4 inches? How fast is the surface area changing at the same instant?
Find the length of the curve between the given two points : Consider the path r(t)=(6t,3t2,3lnt) defined for t>0. Find the length of the curve between the points (6,3,0) and (12,12,3ln(2)).
Describe the fallacy in your own words : Please read and understood all 44 "Dirty Tricks", explaining on pages 19-37 of "The Thinker's Guide to Fallacies". Describe the fallacy in your own words (not copied from the book). Explain where in the speech you have detected this fallacy

Reviews

Write a Review

Computer Networking Questions & Answers

  Describing status of 3g and 4g network technologies

Describe in scholarly detail status of 3G and 4G network technologies and even challenge yourself to find out any research on future of 5G technology.

  Develop a wbs and network diagram

You have been assigned to install workstation, software, and networking equipment for a 250-person call center. Develop a WBS, Network Diagram, and Gantt Chart for the project

  Difference between wats and leased lines

Discuss the differences between Wide Area Telecommunications Service and leased lines?

  Mobile computing and wireless computing are synonymous

Decide whether or not mobile computing and wireless computing are synonymous. Provide at least two (2) reasons to support your assertion and justify your response.

  Develop a plan for the installation of the new nics

Develop a plan for the installation of the new NICs within the company network and Collate these results to create an outline of the requirements that the new NIC would need to meet (for Windows XP, Office 2007 and network requirements obtained fro..

  Xyz corporation employs 40000 people with their own

xyz corporation employs 40000 people with their own associated ip addresses and operates over 400 servers including

  Discuss the types of monitoring and alarms

Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented

  What types of services are available within the tcpip

write a 2- to 3-page memo to your supervisor discussing the following topicswhat types of services are available within

  Biometric authentication methods for online transactions

Biometric authentication methods for online transactions, The physical attributes inherent in biometric authentication methods raise interesting problems

  Explain how would you perform the batch configuration

you install a proxy server system in a midsize organization with about 100 separate hosts distributed among several

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

  Determine congestion window sizes after milliseconds

If both C1 and C2 at time t0 have congestion window of 10 segments, determine their congestion window sizes after 2200 msec?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd