Academic Advisor: Dr. Yuval Elovici Technical Advisor: Dr. Lidror Troyansky ADD Presentation.

Slides:



Advertisements
Similar presentations
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Advertisements

Components of GIS.
Team: Maya Zalcberg Diana Attar Levona Hershtik Academic advisor: Prof. Ehud Gudes ADD Presentation.
Academic Advisor: Prof. Ronen Brafman Team Members: Ran Isenberg Mirit Markovich Noa Aharon Alon Furman.
Technical Advisor: Dr. Lidror Troyansky Presents: Academic Advisor: Dr. Yuval Elovic.
Academic Advisor: Dr. Yuval Elovici Technical Advisor: Dr. Lidror Troyansky.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
What’s New in WatchGuard XCS 10.0 Update 2 WatchGuard Training.
Chapter 3 Planning Your Solution
A Guide to major network components
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
1 Enabling Secure Internet Access with ISA Server.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Linux Operations and Administration
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Computer for Health Sciences
INTRODUCTION TO WEB DATABASE PROGRAMMING
Central Online Grading System COGS Dec15-21 dec1521.sd.ece.iastate.edu.
Irwin/McGraw-Hill Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
1 MUST HAVE SHOULD HAVE COULD HAVE Module # 140. Practical Class Exercise’s, 2 nd session Objectives: Know how to: –Setup a Flowmeter –add Channel based.
Web application architecture
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
Finish configuration cloudclinica root jdbc:postgresql:5432//localhost/cc_db JDBC Url: JDBC Driver: User name: Password: ******** org.postgresql.Driver.
TriUlti Senior Project iFlowEdit HTML5 Canvas Workflow Diagram Editor Sponsored By iNNOVA IT Solution Inc.
CHAPTER FOUR COMPUTER SOFTWARE.
1 1 TRACO Excel Upload. 2 TRACO 2nd step - Excel Upload Contents 1.Security 2.Overview / Aim 3.Basic principles 4.Download existing Services/Rates 5.Handling.
TVAC Electronic Call Sheet System Team HeatWave Summer 2007.
Introduction to Interactive Media Interactive Media Tools: Software.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Software Requirements Presented By Dr. Shazzad Hosain.
Bonrix SMPP Client. Index Introduction Software and Hardware Requirements Architecture Set Up Installation HTTP API Features Screen-shots.
Learningcomputer.com SQL Server 2008 Configuration Manager.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Computer Emergency Notification System (CENS)
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
An Introduction to Software Engineering. Communication Systems.
Weka: Experimenter and Knowledge Flow interfaces Neil Mac Parthaláin
Technical Advisor - Mr. Roni Stern Academic Advisor - Dr. Meir Kelah Members: Shimrit Yacobi Yuval Binenboim Moran Lev Lehman Sharon Shabtai.
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team Client: Dr. Joseph Berrios Team Client:
Planning an Installation and d Upgrade. Learning Objectives  To learn how to plan an upgrade and installation.
We now will use Advanced Search Builder option. Access to Advanced is from the initial PubMed page or the Search Results page. Advanced Search.
Files Tutor: You will need ….
Management System For Graduate Students Projects Day Presentation – June 2011.
CSI 3125, Preliminaries, page 1 SERVLET. CSI 3125, Preliminaries, page 2 SERVLET A servlet is a server-side software program, written in Java code, that.
Chapter 5 Introduction To Form Builder. Lesson A Objectives  Display Forms Builder forms in a Web browser  Use a data block form to view, insert, update,
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
TROI – SPC Database Walkthrough Training Presentation Doc. USTP0213 Rev4.
PROGRAMMING PRE- AND POSTCONDITIONS, INVARIANTS AND METHOD CONTRACTS B MODULE 2: SOFTWARE SYSTEMS 13 NOVEMBER 2013.
Correlator GUI Sonja Vrcic Socorro, April 3, 2006.
GAIA (Genetic Algorithm Interface Architecture) Requirements Analysis Document (RAD) Version 1.0 Created By: Charles Hall Héctor Aybar William Grim Simone.
Company: Amdocs Academic advisor: Ehud Gudes Technical advisor :Gabby Shimony Team: Uzi Lewin Elina Shlangman.
Technical lssues for the Knowledge Engineering Competition Stefan Edelkamp Jeremy Frank.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
System.
PLM, Document and Workflow Management
FTP - File Transfer Protocol
CHAPTER 3 Architectures for Distributed Systems
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
DATABASES WHAT IS A DATABASE?
Automation of Control System Configuration TAC 18
Presentation transcript:

Academic Advisor: Dr. Yuval Elovici Technical Advisor: Dr. Lidror Troyansky ADD Presentation

Continued…

Develop a system which will: –be able to Configure the searching parameters. –scan the P2P networks. –download files suspicious as confidential. –analyze the material using Machine Learning. –generate reports. –produce statistics.

Scanning and looking for suspicious target (e.g. as confidential) information in the P2P network (Gnutella). Downloading the suspicious target (e.g. as confidential) information from the P2P network (Gnutella). Analyzing the scanned results (determine the value of the documents). –The system will use the Machine Learning based on the filtering algorithm to classify the documents.filtering algorithm Statistics Gathering: –The number of users which currently hold the target information. –Using IP Geolocation and finding out the geographic location of the leaked information. –The history of searched for, downloaded & analyzed files.

Performance constraints: –The system should return a search result for suspicious target after no more than 15 minutes. –The system should not limit the download target time. (Remark: it should be configurable. By default, a time-out should always be set) –The system should hold history result and statistics of not more than one year ago. Safety and Security: –The system will not be used for any other purpose than find information leaks in P2P networks (e.g. to find MP3 shares). –The system will not expose the confidential documents it downloads and the documents were used in the Machine Learning algorithm.

The system is constructed from several components which are written in different languages and communicate between each other in several ways. All software modules reside in the same computer. –IGTellaHandler- The primary responsibility of this component is downloading documents from the Gnutella Network. The IGTellaHandler is written in Java and communicates with the main component (P2PinspectorGadget) via RMI technology (to increase the de-coupling between the copmonents). –IGConfClassifier- The primary responsibility of this component is classifying documents using different classification rules. The output of this process will be saved in the database, and will be available for further use.

–IGDBHandler- The primary responsibility of this component is connecting to an external database and stand as an interface for the system's modules for the database. IGDBHandler will be written in java and will communicate with the main component via RMI communication. –P2PInspectorGadget- This component is the system's main component, it has two primary reponsibilities, the first is interaction with the user via the Graphical User Interface, and the second is to control the flow of the system. P2PinspectorGadget will be written in Java and will connect to the different components with the connection mentioned above, and will not communicate with any other external system.

Searching files – seq. diagram

Unit testing All the units will be tested for every use case. For each use-case all of the possible paths will be tested. The unit testing is a part of the design of the project, an automated tests are running all of the time when we develop the system. Here are some of the testing in the test-plan: –[Start system] Starting the system with a firewall blocking of the P2P needed ports, and see that the system doesn't crush and outputs the right error message. –[Scan network] Verify that this process concludes after a pre- defined time-out. –[Analyze downloaded files] Verify that the system converts the different text formats (DOC, PPT and PDF) correctly into "raw" text. –[Analyze downloaded files] Verify accuracy of the algorithm (achieving the standard of false-positive and true-positive as defined in the project's targets.

Acceptance Tests: As a part of the acceptance tests, all of the use cases will be fully checked from the beginning to the end. In addition, all of the non-functional requirements will be tested to make sure they meet their targets: –System's History: In order to verify that the System saves all the information for the period that the user has defined (default is 1 year), we shall manually try to change the system's clock and trick and see that the data that needs to be saved is saved and the data that should have been deleted, is deleted. –System legitimacy (non pirate uses): The system will be blocked for uploading data, this will be checked with planting a unique media file (maybe MP3, or MPEG) that we composed, with a unique name, and try with a different client to download the media file.

–Content Safety: In order to test for Content safety (classified documents used for the learning part of the algorithm will not be exposed to the P2P network), those two sub-application are running as a separate processes with different memory space. The test will be attempt from another client to download the classified documents or the list of the documents from the process that connnects to the P2P network.

Create and Integrate the GUI. Find a list of Gnutella1 working servers. Classification algorithm inspecting and learning. Integrate Python written algorithm to Java. Finish PDF 2 DOC converter. Finish Gnutella driver (able to perform search and download of documents).