• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

designing an intrusion detection system

 
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hello everyone!!
I am working on my final year project on network intrusion detection system....I would appreciate anyone help concerning the necessary algorithm, any useful website, links..I am not really familiar in programming too...I know it sound crazy..but I am willing to take the challenge..thanks in advance for your help..
any help from you guys would be appreciated so much..thanks in advance...
 
author & internet detective
Posts: 41860
908
Eclipse IDE VI Editor Java
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Welcome to CodeRanch!

I wouldn't use Java for that. You'd need to be monitoring the ports and files and the like. Before asking random people on the internet, what have you read on the topic so far? Surely, you have read something before posting hear - even wikipedia. Also, what programming language do you know. You say you aren't familiar with programming. You are going to need to learn a language before being able to attempt this project.
 
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hi. I am doing a similar project. i would like to know if you used signatures to identify attacks(if yes, which one? if no, what method did you use?) and if you have done part of the implementation on java?. thanks
 
Greenhorn
Posts: 2
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hi, i have similar problem. i just don't know what parameters i used to classified the intrusion. i'm using kddcup 99 as my dataset. i want to compare features on incoming packet with my normal packet data based on kddcup99. how did i know that incoming data is intrusion?
reply
    Bookmark Topic Watch Topic
  • New Topic