Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

NIDS ppt

4,268 views

Published on

It tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by monitoring network traffic.

Published in: Education
  • Dating direct: ♥♥♥ http://bit.ly/2u6xbL5 ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Sex in your area is here: ♥♥♥ http://bit.ly/2u6xbL5 ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

NIDS ppt

  1. 1. WELCOME
  2. 2. NETWORK INTRUSION DETECTION SYSTEM
  3. 3. NETWORK INTRUSION DETECTION SYSTEM <ul><li>Introduction </li></ul><ul><li>Phases </li></ul><ul><li>System Study </li></ul><ul><li>System Analysis </li></ul><ul><li>System Study </li></ul><ul><li>Testing </li></ul><ul><li>Implementation </li></ul>
  4. 4. INTRODUCTION
  5. 5. PHASES <ul><li>Phase 1: </li></ul><ul><li>Searching </li></ul><ul><li>Analysis </li></ul><ul><li>Modules </li></ul><ul><li>Module Activities </li></ul><ul><li>H/w & S/w Configuration </li></ul><ul><li>Existing System </li></ul><ul><li>Proposed System </li></ul>Phase 2: Design Data Flow Diagram Entity Relationship Diagram UML Diagram Phase 3: System Architectural Design Phase 4: Coding part
  6. 6. System Study <ul><li>Existing System </li></ul><ul><ul><ul><li>Drawbacks of Existing System </li></ul></ul></ul><ul><li>Proposed System </li></ul><ul><ul><ul><li>Benefits of Proposed System </li></ul></ul></ul>
  7. 7. MODULES <ul><li>Administrator Module </li></ul><ul><li>Detection Module </li></ul><ul><li>Reports Module </li></ul>
  8. 8. SYSTEM ANALYSIS <ul><li>System Configuration </li></ul><ul><li>Hardware Configuration </li></ul><ul><li>Software Configuration </li></ul>
  9. 9. HARDWARE CONFIGURATION <ul><li>PROCESSOR - INTEL PENTIUM III </li></ul><ul><li>HARD DISK SPACE - 40 GB </li></ul><ul><li>MEMORY - 256 MB </li></ul>
  10. 10. SOFTWARE CONFIGURATION <ul><li>OPERATING SYSTEM - WINDOWS 2000 SERVER </li></ul><ul><li>FRONT END - MS VISUAL STUDIO 2005 </li></ul><ul><li>BACK END - MS SQL SERVER 2005 </li></ul>
  11. 11. FEASIBILITY STUDY <ul><li>Technical Feasibility </li></ul><ul><li>Economic Feasibility </li></ul><ul><li>Operational Feasibility </li></ul>
  12. 12. DATA FLOW DIAGRAM LEVEL 0 : NIDS USER Administrator Intruder Maintain Details ask Maintain Details send dp Send cmd send cmd Hack dp Maintain Details
  13. 13. NIDS User LEVEL 1 : Data Packet Receive Acknowledgement Give the definition of the packet and content Give the definition of the packet like ip add, port number Packet Details D3 Packet content D4 Ack Details D5
  14. 14. Transform Monitor Administrator Intruder Data Packet User Maintain Name Password User_id address Contents Packet_no port Packet add Admin_id Password Name ENTITY RELATIONSHIP DIAGRAM FOR NIDS
  15. 15. UML DIAGRAM Transaction Receive Packet Send Packet View Intruder Close Transaction Start End
  16. 16. Controlling the System Log Off Shutdown Reboot Stop System Start End Fork Joint
  17. 17. TESTING
  18. 18. SCREEN SHOTS
  19. 19. Login
  20. 20. Home Page
  21. 21. Account Management
  22. 22. Lock
  23. 23. Intruder Registration
  24. 24. Non Intruder Registration
  25. 25. Sniffing
  26. 26. Detection
  27. 27. Packet Details
  28. 28. Network Management
  29. 29. Thank You

×