SlideShare a Scribd company logo
1 of 1
PROPOSED SYSTEM

         We focus on analyzing the traffic at an egress router.
          Monitoring traffic at a source network enables early detection
          of attacks
         Ingress filtering protects the flow of traffic entering into an
          internal network under administrative control

         Egress filtering controls the flow of traffic leaving the
           administered network. Thus, internal machines are typically the
           origin of this outbound traffic in view of an egress filter.

         With such filtering in place, we can focus on destination
          addresses and port numbers of the outgoing traffic for analysis
          purposes.


EXISTING SYSTEM

   There is no well established existing system to prevent the network
    traffic. Many approaches have been studied to detect, prevent and
    mitigate malicious network traffic

   Work in [43] relies on input data from multiple sources (i.e., all links
    in a network), while our work focuses on a single link at a time

   Our study builds on this earlier work and extends the statistical
    analysis of traffic data further in analyzing other packet header data
    addresses and port numbers in real-time

More Related Content

Viewers also liked

Control from the crypt end of life documentation
Control from the crypt end of life documentationControl from the crypt end of life documentation
Control from the crypt end of life documentationJohn Martin
 
Revista Gingando para Cidadania
Revista Gingando para CidadaniaRevista Gingando para Cidadania
Revista Gingando para Cidadaniaprofbola
 
How to buy - www.chinese-apparel.com
How to buy - www.chinese-apparel.comHow to buy - www.chinese-apparel.com
How to buy - www.chinese-apparel.comDamir Salikhov
 
2010 Chevy Corvette Indianapolis
2010 Chevy Corvette Indianapolis2010 Chevy Corvette Indianapolis
2010 Chevy Corvette IndianapolisHare Chevrolet
 
Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day
Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day
Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day Devino Telecom
 
Brand new Seductive PPT
Brand new Seductive PPTBrand new Seductive PPT
Brand new Seductive PPTMax Semenchuk
 
Zakazy i nakazy .
Zakazy i nakazy .Zakazy i nakazy .
Zakazy i nakazy .beatarejent
 
Tổng Quan Park Hill - Times City
Tổng Quan Park Hill - Times CityTổng Quan Park Hill - Times City
Tổng Quan Park Hill - Times CityQuang Huy
 
Rheological properties of scc in terms of its thixotriopic behaviour and its ...
Rheological properties of scc in terms of its thixotriopic behaviour and its ...Rheological properties of scc in terms of its thixotriopic behaviour and its ...
Rheological properties of scc in terms of its thixotriopic behaviour and its ...eSAT Publishing House
 

Viewers also liked (15)

Engager un apprenti
Engager un apprentiEngager un apprenti
Engager un apprenti
 
Control from the crypt end of life documentation
Control from the crypt end of life documentationControl from the crypt end of life documentation
Control from the crypt end of life documentation
 
nevskyn5
nevskyn5nevskyn5
nevskyn5
 
6th semester Civil Engineering (2009 - June - Juli) Question Papers
6th semester Civil Engineering (2009 - June - Juli) Question Papers6th semester Civil Engineering (2009 - June - Juli) Question Papers
6th semester Civil Engineering (2009 - June - Juli) Question Papers
 
Revista Gingando para Cidadania
Revista Gingando para CidadaniaRevista Gingando para Cidadania
Revista Gingando para Cidadania
 
How to buy - www.chinese-apparel.com
How to buy - www.chinese-apparel.comHow to buy - www.chinese-apparel.com
How to buy - www.chinese-apparel.com
 
Education amnesty
Education amnestyEducation amnesty
Education amnesty
 
Uhe 3
Uhe 3Uhe 3
Uhe 3
 
2010 Chevy Corvette Indianapolis
2010 Chevy Corvette Indianapolis2010 Chevy Corvette Indianapolis
2010 Chevy Corvette Indianapolis
 
Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day
Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day
Бизнес в мобильных приложениях, e-Legion, Mobile Marketing Day
 
Коротко об агентстве Defense
Коротко об агентстве DefenseКоротко об агентстве Defense
Коротко об агентстве Defense
 
Brand new Seductive PPT
Brand new Seductive PPTBrand new Seductive PPT
Brand new Seductive PPT
 
Zakazy i nakazy .
Zakazy i nakazy .Zakazy i nakazy .
Zakazy i nakazy .
 
Tổng Quan Park Hill - Times City
Tổng Quan Park Hill - Times CityTổng Quan Park Hill - Times City
Tổng Quan Park Hill - Times City
 
Rheological properties of scc in terms of its thixotriopic behaviour and its ...
Rheological properties of scc in terms of its thixotriopic behaviour and its ...Rheological properties of scc in terms of its thixotriopic behaviour and its ...
Rheological properties of scc in terms of its thixotriopic behaviour and its ...
 

Similar to Exit&proposed

Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...skpatel91
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...skpatel91
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxRebeccaMunasheChimhe
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Disha Bedi
 
Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approachesjyoti_lakhani
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networkingShyam Kumar Singh
 
Stars : a statistical traffic pattern discovery system for manets
Stars : a statistical traffic pattern discovery system for manetsStars : a statistical traffic pattern discovery system for manets
Stars : a statistical traffic pattern discovery system for manetsPapitha Velumani
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd Iaetsd
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection amiable_indian
 
Penetration testing
Penetration testing Penetration testing
Penetration testing PTC
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...Shakas Technologies
 

Similar to Exit&proposed (20)

Antony review
Antony reviewAntony review
Antony review
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
A1803050106
A1803050106A1803050106
A1803050106
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
L5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptxL5A - Intrusion Detection Systems.pptx
L5A - Intrusion Detection Systems.pptx
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
Network Intrusion Prevention by Configuring ACLs on the Routers, based on Sno...
 
Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approaches
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
Stars : a statistical traffic pattern discovery system for manets
Stars : a statistical traffic pattern discovery system for manetsStars : a statistical traffic pattern discovery system for manets
Stars : a statistical traffic pattern discovery system for manets
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacks
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
idps
idpsidps
idps
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Penetration testing
Penetration testing Penetration testing
Penetration testing
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
 

More from Antony jeberson (7)

Ug level
Ug levelUg level
Ug level
 
Sana
SanaSana
Sana
 
Resume model
Resume modelResume model
Resume model
 
Nagaraj
NagarajNagaraj
Nagaraj
 
Jeyakumar
JeyakumarJeyakumar
Jeyakumar
 
Antony resume
Antony resumeAntony resume
Antony resume
 
Antony new format
Antony new formatAntony new format
Antony new format
 

Exit&proposed

  • 1. PROPOSED SYSTEM  We focus on analyzing the traffic at an egress router. Monitoring traffic at a source network enables early detection of attacks  Ingress filtering protects the flow of traffic entering into an internal network under administrative control  Egress filtering controls the flow of traffic leaving the administered network. Thus, internal machines are typically the origin of this outbound traffic in view of an egress filter.  With such filtering in place, we can focus on destination addresses and port numbers of the outgoing traffic for analysis purposes. EXISTING SYSTEM  There is no well established existing system to prevent the network traffic. Many approaches have been studied to detect, prevent and mitigate malicious network traffic  Work in [43] relies on input data from multiple sources (i.e., all links in a network), while our work focuses on a single link at a time  Our study builds on this earlier work and extends the statistical analysis of traffic data further in analyzing other packet header data addresses and port numbers in real-time