SlideShare a Scribd company logo
A network intrusion detection system (NIDS) analyzes all incoming and outgoing traffic for
signs of intrusion. More specifically, a NIDS extracts the payload part of each network packet,
and compares it with rules that are called vulnerability signatures. The payload is the actual data
part of a network packet. Attackers have adapted their exploit techniques to try to evade the
various checks that are performed by a NIDS. Attackers split the attack data into multiple
network packets. That way, a single packet payload does not match any vulnerability signatures.
On the other hand, defenders have improved the code of NIDS by reassembling fragmented
network packets before analyzing them, so that their payloads are merged and analyzed as a
single piece of data. NIDS uses a linked list to store network packets in ascending order based on
TCP sequence numbers. When a new network packet arrives, the NIDS needs to insert it in the
linked list at a position that does not break the ascending order of the nodes. Furthermore, if the
linked list already contains a node, i.e. a packet, that has the same TCP sequence number as the
new packet, then the NIDS does the following: 1) Removes the existing node from the linked
list. 2) Extracts its payload and appends it to the payload of the new packet. 3) Inserts the revised
new packet in the linked list at the appropriate position. In this project, we do not implement step
2 given that it is not pertinent to linked lists. This project consists of NIDS code written in Java
that organizes network packets into a linked list in ascending order and without duplicates. This
project description is accompanied by a zip archive named Code.zip, which contains two Java
files, namely intrusionDetectorClass.java and IntNode.java.
Students are required to implement the methods of the IntNode class. The intrusionDetectorClass
simply uses the methods of the IntNode class to create and maintain the linked list of network
packets. Students can verify the correctness of their IntNode class by comparing their output
with the following output: Prj1 is running. The (sequence number, data) pairs in the 1inked 1ist
are: (13,230185386) Running renovebuplicate() on target 13 The linked list is enpty. Running
addNodeInOrder( () on target 13 and data 308329763 The (sequence number, data) pairs in the
linked list are: (13,308329763) Running renoveDuplicate() on target 14 The (sequence number,
data) pairs in the linked 1ist are: (13,3e8329763) Running addwodeInonder() on target 14 and
data 248041794 The (sequence number, data) pairs in the linked list are:
(13,3e8329763)(14,248941794) Running renoveDuplicate() on target 14 The (sequence number,
data) pairs in the 1inked 11st are: (13,308329763) Running addNodeInorder() on target 14 and
data 295106305 The (sequence number, data) pairs in the linked 1ist are: (13,308329763) (14,
295106305) Running renovebuplicate() on target 15 The (sequence number, data) pairs in the
1inked 11st are: (13,398329763) (14,2951e63es) Running addNodeInonder () on target 15 and
data 325615905 The (sequence number, data) pairs in the Linked 11st are:
(13,308329763)(14,2951063e5) (15, 3256159es) Running renoveduplicate() on target 16 The
(sequence number, data) pairs in the linked 11st are: (13,368329763) (14, 2951063e5) (15,
325615905) Running adovodeInorder() on target 16 and data 652976466 The (sequence number,
data) pairs in the linked list are: (13,393329763) (14,2951e63es) (15,325615905)(16,652976466)
whose method is activated, // is removed from the linked list. public void removeNodeAfter( ) {
// Implement me. } // Precondition: This instance of the IntNode class exists. // Postcondition:
The sequenceNumber of this node is returned. public int getsequenceNumber( ) { // Implement
me. } // Precondition: This instance of the IntNode class exists. // Postcondition: The link of this
node is returned. public IntNode getLink( ) { // Implement me. } // Precondition: The linked list
contains at least one element. // Postcondition: The (sequence number, data) pairs of each node
in the linked list, starting with the head, // are displayed on the monitor. public void
displayNodeData(IntNode head) { // Implement me. } // Precondition: The head of the linked
list is different than null, and its sequenceNumber is different than target. // Postcondition: The
link to the specific node, which comes before the node whose sequenceNumber is equal to target,
// is returned. If the linked list does not contain a ponde with sanuanceNumber
// Precondition: The linked list contains at least one element. // Postcondition: The (sequence
number, data) pairs of each node in the linked list, starting with the head, // are displayed on the
monitor. public void displayNodeData(IntNode head) { // Implement me. } // Precondition: The
head of the linked list is different than null, and its sequenceNumber is different than target. //
Postcondition: The link to the specific node, which comes before the node whose
sequenceNumber is equal to target, // is returned. If the linked list does not contain a node with
sequenceNumber equal to target, then null is returned. public IntNode findPrevious (IntNode
head, int target) } // Implement me. { // Implement me. } // Precondition: The head of the
linked list is different than null, and its sequenceNumber is smaller than target. // Postcondition:
The link to the specific node, which comes before the node that is the first in the linked list // to
have a sequenceNumber greater than target, is returned. // If no such node is found, the link to
the last node in the linked list is returned. public IntNode locatePredecessor(IntNode head, int
target) { // Implement me. } }
Running removeDuplicate() on target 17 The (sequence number, data) pairs in the linked list are:
(13,308329763)(14,295166305)(15,325615905)(16,652976466) Running addNodeInOrder() on
target 17 and data 847897267 The (sequence number, data) pairs in the 1 inked 1 ist are:
(13,308329763)(14,295106305)(15,325615905)(16,652976466)(17,847897267) Running
removeDuplicate() on target 17 The (sequence number, data) pairs in the linked 1ist are:
(13,308329763)(14,295106305)(15,325615905)(16,652976466) Running addNodeInOrder() on
target 17 and data 927847798 The (sequence number, data) pairs in the linked 1 ist are:
(13,308329763)(14,295106305)(15,325615905)(16,652976466)(17,927847798) End of run.
package library; public class IntNode { private int sequenceNumber; private int data; private
IntNode link; // Precondition: // Postcondition: All instance variables of the IntNode class are
initialized in order. public IntNode(int initialsequenceNumber, int initialdata, IntNode initiallink)
{ // Implement me. } // Precondition: This instance of the IntNode class exists. // In other
words, the object whose method is activated exists as a node in the linked list. // Postcondition: A
new node with attributes item and data is created. Item serves as sequenceNumber. // The new
node is added to the linked list at a position that comes immediately after the node whose method
is activated. public void addNodeAfter(int item, int data) { // Implement me. } // Precondition:
This instance of the IntNode class exists. // In other words, the object whose method is activated
exists as a node in the linked list. // Postcondition: The specific node, which comes immediately
after the node whose method is activated,

More Related Content

Similar to A network intrusion detection system (NIDS) analyzes all incoming and.pdf

computer notes - Linked list
computer notes - Linked listcomputer notes - Linked list
computer notes - Linked list
ecomputernotes
 
Merge sort analysis and its real time applications
Merge sort analysis and its real time applicationsMerge sort analysis and its real time applications
Merge sort analysis and its real time applications
yazad dumasia
 
Linked List, Types of Linked LIst, Various Operations, Applications of Linked...
Linked List, Types of Linked LIst, Various Operations, Applications of Linked...Linked List, Types of Linked LIst, Various Operations, Applications of Linked...
Linked List, Types of Linked LIst, Various Operations, Applications of Linked...
Balwant Gorad
 
computer notes - Linked list inside computer memory
computer notes - Linked list inside computer memorycomputer notes - Linked list inside computer memory
computer notes - Linked list inside computer memory
ecomputernotes
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programming
csandit
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
cscpconf
 
linked list
linked listlinked list
linked list
Shaista Qadir
 
Array linked list.ppt
Array  linked list.pptArray  linked list.ppt
Array linked list.ppt
Waf1231
 
Ch17
Ch17Ch17
Ch17
Abbott
 
Chapter 5 ds
Chapter 5 dsChapter 5 ds
Chapter 5 ds
Hanif Durad
 
There are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdfThere are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdf
aamousnowov
 
Add these methods to the code - -Create at least three classes such.pdf
Add these methods to the code -   -Create at least three classes such.pdfAdd these methods to the code -   -Create at least three classes such.pdf
Add these methods to the code - -Create at least three classes such.pdf
SebastianRzuHarrisw
 
Week 2 - Data Structures and Algorithms
Week 2 - Data Structures and AlgorithmsWeek 2 - Data Structures and Algorithms
Week 2 - Data Structures and Algorithms
Ferdin Joe John Joseph PhD
 
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value PairsLearning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value Pairs
phanleson
 
Data structure
 Data structure Data structure
Data structure
Shahariar limon
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
JAGDEEPKUMAR23
 
Study material ip class 12th
Study material ip class 12thStudy material ip class 12th
Study material ip class 12th
animesh dwivedi
 
L3
L3L3
L3
lksoo
 
Please help solve this in C++ So the program is working fin.pdf
Please help solve this in C++ So the program is working fin.pdfPlease help solve this in C++ So the program is working fin.pdf
Please help solve this in C++ So the program is working fin.pdf
ankit11134
 
Singly Linked List
Singly Linked ListSingly Linked List
Singly Linked List
raghavbirla63
 

Similar to A network intrusion detection system (NIDS) analyzes all incoming and.pdf (20)

computer notes - Linked list
computer notes - Linked listcomputer notes - Linked list
computer notes - Linked list
 
Merge sort analysis and its real time applications
Merge sort analysis and its real time applicationsMerge sort analysis and its real time applications
Merge sort analysis and its real time applications
 
Linked List, Types of Linked LIst, Various Operations, Applications of Linked...
Linked List, Types of Linked LIst, Various Operations, Applications of Linked...Linked List, Types of Linked LIst, Various Operations, Applications of Linked...
Linked List, Types of Linked LIst, Various Operations, Applications of Linked...
 
computer notes - Linked list inside computer memory
computer notes - Linked list inside computer memorycomputer notes - Linked list inside computer memory
computer notes - Linked list inside computer memory
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programming
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
 
linked list
linked listlinked list
linked list
 
Array linked list.ppt
Array  linked list.pptArray  linked list.ppt
Array linked list.ppt
 
Ch17
Ch17Ch17
Ch17
 
Chapter 5 ds
Chapter 5 dsChapter 5 ds
Chapter 5 ds
 
There are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdfThere are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdf
 
Add these methods to the code - -Create at least three classes such.pdf
Add these methods to the code -   -Create at least three classes such.pdfAdd these methods to the code -   -Create at least three classes such.pdf
Add these methods to the code - -Create at least three classes such.pdf
 
Week 2 - Data Structures and Algorithms
Week 2 - Data Structures and AlgorithmsWeek 2 - Data Structures and Algorithms
Week 2 - Data Structures and Algorithms
 
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value PairsLearning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value Pairs
 
Data structure
 Data structure Data structure
Data structure
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 
Study material ip class 12th
Study material ip class 12thStudy material ip class 12th
Study material ip class 12th
 
L3
L3L3
L3
 
Please help solve this in C++ So the program is working fin.pdf
Please help solve this in C++ So the program is working fin.pdfPlease help solve this in C++ So the program is working fin.pdf
Please help solve this in C++ So the program is working fin.pdf
 
Singly Linked List
Singly Linked ListSingly Linked List
Singly Linked List
 

More from Fablooksurat

A Personal Fitness Tracker is a wearable device that tracks your phys.pdf
A Personal Fitness Tracker is a wearable device that tracks your phys.pdfA Personal Fitness Tracker is a wearable device that tracks your phys.pdf
A Personal Fitness Tracker is a wearable device that tracks your phys.pdf
Fablooksurat
 
38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf
38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf
38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf
Fablooksurat
 
3 Assumption KLM Company has a petty cash funds for small expenses i.pdf
3 Assumption KLM Company has a petty cash funds for small expenses i.pdf3 Assumption KLM Company has a petty cash funds for small expenses i.pdf
3 Assumption KLM Company has a petty cash funds for small expenses i.pdf
Fablooksurat
 
24. Which one of the four components of the exposure rectangle do ext.pdf
24. Which one of the four components of the exposure rectangle do ext.pdf24. Which one of the four components of the exposure rectangle do ext.pdf
24. Which one of the four components of the exposure rectangle do ext.pdf
Fablooksurat
 
3 The Republican National Committee (RNC) has hired three consultants.pdf
3 The Republican National Committee (RNC) has hired three consultants.pdf3 The Republican National Committee (RNC) has hired three consultants.pdf
3 The Republican National Committee (RNC) has hired three consultants.pdf
Fablooksurat
 
2. Prepare the statement of stockholders equity for the year ended D.pdf
2. Prepare the statement of stockholders equity for the year ended D.pdf2. Prepare the statement of stockholders equity for the year ended D.pdf
2. Prepare the statement of stockholders equity for the year ended D.pdf
Fablooksurat
 

More from Fablooksurat (6)

A Personal Fitness Tracker is a wearable device that tracks your phys.pdf
A Personal Fitness Tracker is a wearable device that tracks your phys.pdfA Personal Fitness Tracker is a wearable device that tracks your phys.pdf
A Personal Fitness Tracker is a wearable device that tracks your phys.pdf
 
38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf
38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf
38. What is the objective of a FRA (fraud risk assessment) A. To pro.pdf
 
3 Assumption KLM Company has a petty cash funds for small expenses i.pdf
3 Assumption KLM Company has a petty cash funds for small expenses i.pdf3 Assumption KLM Company has a petty cash funds for small expenses i.pdf
3 Assumption KLM Company has a petty cash funds for small expenses i.pdf
 
24. Which one of the four components of the exposure rectangle do ext.pdf
24. Which one of the four components of the exposure rectangle do ext.pdf24. Which one of the four components of the exposure rectangle do ext.pdf
24. Which one of the four components of the exposure rectangle do ext.pdf
 
3 The Republican National Committee (RNC) has hired three consultants.pdf
3 The Republican National Committee (RNC) has hired three consultants.pdf3 The Republican National Committee (RNC) has hired three consultants.pdf
3 The Republican National Committee (RNC) has hired three consultants.pdf
 
2. Prepare the statement of stockholders equity for the year ended D.pdf
2. Prepare the statement of stockholders equity for the year ended D.pdf2. Prepare the statement of stockholders equity for the year ended D.pdf
2. Prepare the statement of stockholders equity for the year ended D.pdf
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

A network intrusion detection system (NIDS) analyzes all incoming and.pdf

  • 1. A network intrusion detection system (NIDS) analyzes all incoming and outgoing traffic for signs of intrusion. More specifically, a NIDS extracts the payload part of each network packet, and compares it with rules that are called vulnerability signatures. The payload is the actual data part of a network packet. Attackers have adapted their exploit techniques to try to evade the various checks that are performed by a NIDS. Attackers split the attack data into multiple network packets. That way, a single packet payload does not match any vulnerability signatures. On the other hand, defenders have improved the code of NIDS by reassembling fragmented network packets before analyzing them, so that their payloads are merged and analyzed as a single piece of data. NIDS uses a linked list to store network packets in ascending order based on TCP sequence numbers. When a new network packet arrives, the NIDS needs to insert it in the linked list at a position that does not break the ascending order of the nodes. Furthermore, if the linked list already contains a node, i.e. a packet, that has the same TCP sequence number as the new packet, then the NIDS does the following: 1) Removes the existing node from the linked list. 2) Extracts its payload and appends it to the payload of the new packet. 3) Inserts the revised new packet in the linked list at the appropriate position. In this project, we do not implement step 2 given that it is not pertinent to linked lists. This project consists of NIDS code written in Java that organizes network packets into a linked list in ascending order and without duplicates. This project description is accompanied by a zip archive named Code.zip, which contains two Java files, namely intrusionDetectorClass.java and IntNode.java. Students are required to implement the methods of the IntNode class. The intrusionDetectorClass simply uses the methods of the IntNode class to create and maintain the linked list of network packets. Students can verify the correctness of their IntNode class by comparing their output with the following output: Prj1 is running. The (sequence number, data) pairs in the 1inked 1ist are: (13,230185386) Running renovebuplicate() on target 13 The linked list is enpty. Running addNodeInOrder( () on target 13 and data 308329763 The (sequence number, data) pairs in the
  • 2. linked list are: (13,308329763) Running renoveDuplicate() on target 14 The (sequence number, data) pairs in the linked 1ist are: (13,3e8329763) Running addwodeInonder() on target 14 and data 248041794 The (sequence number, data) pairs in the linked list are: (13,3e8329763)(14,248941794) Running renoveDuplicate() on target 14 The (sequence number, data) pairs in the 1inked 11st are: (13,308329763) Running addNodeInorder() on target 14 and data 295106305 The (sequence number, data) pairs in the linked 1ist are: (13,308329763) (14, 295106305) Running renovebuplicate() on target 15 The (sequence number, data) pairs in the 1inked 11st are: (13,398329763) (14,2951e63es) Running addNodeInonder () on target 15 and data 325615905 The (sequence number, data) pairs in the Linked 11st are: (13,308329763)(14,2951063e5) (15, 3256159es) Running renoveduplicate() on target 16 The (sequence number, data) pairs in the linked 11st are: (13,368329763) (14, 2951063e5) (15, 325615905) Running adovodeInorder() on target 16 and data 652976466 The (sequence number, data) pairs in the linked list are: (13,393329763) (14,2951e63es) (15,325615905)(16,652976466) whose method is activated, // is removed from the linked list. public void removeNodeAfter( ) { // Implement me. } // Precondition: This instance of the IntNode class exists. // Postcondition: The sequenceNumber of this node is returned. public int getsequenceNumber( ) { // Implement me. } // Precondition: This instance of the IntNode class exists. // Postcondition: The link of this node is returned. public IntNode getLink( ) { // Implement me. } // Precondition: The linked list contains at least one element. // Postcondition: The (sequence number, data) pairs of each node in the linked list, starting with the head, // are displayed on the monitor. public void displayNodeData(IntNode head) { // Implement me. } // Precondition: The head of the linked list is different than null, and its sequenceNumber is different than target. // Postcondition: The link to the specific node, which comes before the node whose sequenceNumber is equal to target, // is returned. If the linked list does not contain a ponde with sanuanceNumber // Precondition: The linked list contains at least one element. // Postcondition: The (sequence number, data) pairs of each node in the linked list, starting with the head, // are displayed on the monitor. public void displayNodeData(IntNode head) { // Implement me. } // Precondition: The head of the linked list is different than null, and its sequenceNumber is different than target. // Postcondition: The link to the specific node, which comes before the node whose sequenceNumber is equal to target, // is returned. If the linked list does not contain a node with sequenceNumber equal to target, then null is returned. public IntNode findPrevious (IntNode head, int target) } // Implement me. { // Implement me. } // Precondition: The head of the linked list is different than null, and its sequenceNumber is smaller than target. // Postcondition: The link to the specific node, which comes before the node that is the first in the linked list // to
  • 3. have a sequenceNumber greater than target, is returned. // If no such node is found, the link to the last node in the linked list is returned. public IntNode locatePredecessor(IntNode head, int target) { // Implement me. } } Running removeDuplicate() on target 17 The (sequence number, data) pairs in the linked list are: (13,308329763)(14,295166305)(15,325615905)(16,652976466) Running addNodeInOrder() on target 17 and data 847897267 The (sequence number, data) pairs in the 1 inked 1 ist are: (13,308329763)(14,295106305)(15,325615905)(16,652976466)(17,847897267) Running removeDuplicate() on target 17 The (sequence number, data) pairs in the linked 1ist are: (13,308329763)(14,295106305)(15,325615905)(16,652976466) Running addNodeInOrder() on target 17 and data 927847798 The (sequence number, data) pairs in the linked 1 ist are: (13,308329763)(14,295106305)(15,325615905)(16,652976466)(17,927847798) End of run. package library; public class IntNode { private int sequenceNumber; private int data; private IntNode link; // Precondition: // Postcondition: All instance variables of the IntNode class are initialized in order. public IntNode(int initialsequenceNumber, int initialdata, IntNode initiallink) { // Implement me. } // Precondition: This instance of the IntNode class exists. // In other words, the object whose method is activated exists as a node in the linked list. // Postcondition: A new node with attributes item and data is created. Item serves as sequenceNumber. // The new node is added to the linked list at a position that comes immediately after the node whose method is activated. public void addNodeAfter(int item, int data) { // Implement me. } // Precondition: This instance of the IntNode class exists. // In other words, the object whose method is activated exists as a node in the linked list. // Postcondition: The specific node, which comes immediately after the node whose method is activated,