Beruflich Dokumente
Kultur Dokumente
Table of Contents
1. OVERVIEW .....................................................................................................................2
1. OVERVIEW
Network security has been a very important concept and issue, ever since the Internet
came into existence. The need for security systems against the external attacks from the
hackers has always been a very crucial requirement. One vital type is the Intrusion Detection
System (IDS). Here are two major categories of the analysis techniques of IDS: the anomaly
detection and the misuse detection. The focus mainly is on the misuse detection, which is
collected the attack signatures in a database as the same as virus protection software to detect
2
Software Project Plan
the relate attacks. We propose an algorithm to use the known signature to find the signature of
the related attack quickly.
Data Set analysis 1 Reading the data set and used it for further processing.
Support calculation and 3 Analysis of the attack signature dataset and support
candidate set generation calculation of each attack. Also generation of the
candidate set for the next iteration.
Frequent Item set 3 Generation of Frequent item set in each iteration from
Generation the candidate set. This is depends on the comparison
with the minimum support.
Quality Goals
Use of Dataset containing 1 This should enable system to analyze the attack
the Pre-defined set of signature and association between the attack
attack signature. signatures.
Frequent Item Set 2 This should help in generation of the attack signature.
Constraints:
Known attack signature 1 The misuse detection system is concerned with the
Dataset known attack signature.
2.2.1 Included
3
Software Project Plan