intrusion detection project idea

tanvisharma

tanvisharma

@tanvisharma-wSaer7 Oct 22, 2024
intrusion detection is a good topic for project...
so let us discuss more about intrusion detection...
platform: java

Replies

Welcome, guest

Join CrazyEngineers to reply, ask questions, and participate in conversations.

CrazyEngineers powered by Jatra Community Platform

  • Kaustubh Katdare

    Kaustubh Katdare

    @thebigk Jan 6, 2012

    tanvisharma
    intrusion detection is a good topic for project...
    so let us discuss more about intrusion detection...
    platform: java
    What's your idea of intrusion detection? Tell us what type of intrusion do you want to detect?
  • tanvisharma

    tanvisharma

    @tanvisharma-wSaer7 Jan 6, 2012

    password intruder sir..
  • Kaustubh Katdare

    Kaustubh Katdare

    @thebigk Jan 6, 2012

    tanvisharma
    password intruder sir..
    Still doesn't give much information to suggest anything. Why not provide a detailed information about what you're looking for so that its easier for us to give you suggestions?
  • Rupam Das

    Rupam Das

    @rupam-das-wW5CvN Jan 6, 2012

    for detecting intrusion, you need to model intrusion. Use a packet analyzer first to understand network statistics. Once you understand port access, bandwidth, latency, protocol, TTL, subnet you can think of 'intrusion' detection system. Basically such systems are string matching system where we match the input packet details with set of rules.
  • tanvisharma

    tanvisharma

    @tanvisharma-wSaer7 Jan 8, 2012

    Rupam Das
    for detecting intrusion, you need to model intrusion. Use a packet analyzer first to understand network statistics. Once you understand port access, bandwidth, latency, protocol, TTL, subnet you can think of 'intrusion' detection system. Basically such systems are string matching system where we match the input packet details with set of rules.
    sir, the title of the project is "intrusion detection using conditional random fields"...
    there are different layers like : probe layer, DOS layer,R2L layer, remote layer....
    the different types of attacks occurs in these layers...
    when ever the intruder tries to perform any sort of operation, like cracking the "encrypted password", then the attack raises, in the respective layer...
    this project is not web based, infact it is just window based...