Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: INTERNET TRAFFICMONITORING FOR ANOMALOUS BEHAVIOUR DETECTION:- SEMINAR REPORT
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
INTERNET TRAFFICMONITORING
FOR ANOMALOUS BEHAVIOUR
DETECTION:-


[attachment=66823]


ABSTRACT:-


As the internet continues grow in size and
complexity the challenge of effectively provisioning
managing and securing it has become inextricability
line to a deep understanding of internet traffic.
Although there has been sufficient process in
instrumenting data collection system for high
speed network at the core of the internet
developing a comprehensive understanding of
collected data remains a daunting task . This is due
to the vast quantities of data and the wide diversity
of end host application and services found in
internet traffic.
Recent spates of cyber attacks and frequent
emergence application affecting internet traffic.
Dynamics have made it imperative to develop
effective techniques that can extract and make
sense of significant communication patterns from
internet traffic data for use network operation and
security management. In this pattern we present
general methodology for building comprehensive
behavior profiles of internet backbone traffic in
terms of communication patterns of end –hosts
services. relying on data mining and entry-based
techniques ,the methodology consist of significant
cluster extraction ,automatic behaviors
classification and structural modeling for in
depth interpretive analysis.



LITERATURE REVIEWS:-

Recent spates of cyber attacks and frequent
emergence or applications and affecting
internet traffic dynamics made it imperative to
develop effective techniques that can extract
and make sense of significant communication
patterns from internet traffic data for use in
network operation and security management.
The process of mechanical event detection
heavily depend on the availability and accuracy
of data but in standard monitoring
environment there is life guarantee for these
two factors .to erase the availability and
accuracy of the data we purpose the
deployment of multiline data collectors at
geographically and network, topologically
separated points. We have carried out
experiment on wide area network and have
existing the combined how the quality of the
data can be raised. How the availability and
accuracy of that can be increased using the
collection of redundancy.
In this paper we present a general methodology
for building comprehensive behavior profiles of
internet backbone traffic in terms of
communication patterns of end –host and
services. Relying on mining and entropy based
techniques, the methodology consists of
automatic behavior analysis .we validate the
methodology using due set from and entropy
based techniques, the methodology consists of
automatic behavior analysis .we validate the
methodology using due set from core of the
internet.

CHAPTER -2
SYSTEM STUDY:-


The system study phase analyze the problem of
existing systems defines the objective to be
attained by solution and evaluates various of
solution alternatives.


PROBLEM DEFINITION:-


Recent monitoring systems don’t have
mechanism of detecting events of interest .so it
appears that the operator will either look at all
the traffic to detect events of internet or will not
look at the traffic all in our work we attempt to
mechanically detect event of interest and draw
operator attention to these events .we use data
from wide area network to examine the utility and
effectiveness of the approach. But in standard
monitoring environment there is little guarantee for
these two factors. To raise the availability and
accuracy of the data in purpose the deployment of
multiple data collections at geographically and
network topologically separated point.


GRAPHICAL INTERFACE:-

A graphical interface (GUI) is type of user
interface which allows people to internet
with electronics device such as computers.
hand held devices such as MP3 players
portable media players or gaming devices
household application and office
equipment .a GUI offers graphical icons
and visual indicators as opposed to text
based interfaces type command labels or
text navigation to fully represent the
information and action available to user.
The action is usually performed through
direct manipulation of the
graphical interface.
We have implemented an easy to use
window build graphics user
interface.


CONCLUSION:-

in this paper ,we are introduce our monitoring
and analysis activities about monitoring
activities .we shows our environment in the
local network about analysis activities we show
our monitoring items one is traffic volume and
For a computer network in the age of large data, a behavioral anomaly detection system is discussed which allows to analyze and detect the behavior of anomalous traffic immediately. Many sensor devices connect to the network and tend to generate their application traffic at a fairly low communication speed. In order to observe in a short space of time the traffic information necessary for the traffic analysis, the monitoring system integrates traffic statistics of flows sent from devices that are considered to generate the same application. Detects behavior of anomaly traffic based on the analysis of applications using NMF (Non-negative Matrix Factorisation).