It tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by monitoring network traffic.
13. NIDS User LEVEL 1 : Data Packet Receive Acknowledgement Give the definition of the packet and content Give the definition of the packet like ip add, port number Packet Details D3 Packet content D4 Ack Details D5
14. Transform Monitor Administrator Intruder Data Packet User Maintain Name Password User_id address Contents Packet_no port Packet add Admin_id Password Name ENTITY RELATIONSHIP DIAGRAM FOR NIDS
15. UML DIAGRAM Transaction Receive Packet Send Packet View Intruder Close Transaction Start End