Presentation is loading. Please wait.

Presentation is loading. Please wait.

Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection.

Similar presentations


Presentation on theme: "Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection."— Presentation transcript:

1

2 Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs.

3 MODULES Constructing Sensor Network Packet Creation
Find authorized and un authorized port Constructing Inter-Domain Packet Filters Receiving the valid packet

4 Data Flow Diagram Heterogeneous multiple sensor
Detec1 A S1 Detec2 B S2 Detec3 C Data Flow Intruder Sending packet from source S to D

5 Heterogeneous single sensor
Rec1 Rec 3 Detector Data Flow Rec 2 Source Filter

6 Access Models A Java Server Pages file may be accessed in at least two different ways: A client request comes directly into a Java Server Page.

7 Native code is code that after you compile it, the compiled code runs on a specific hardware platform. As a platform-independent environment, the Java platform can be a bit slower than native code. However, smart compilers, well-tuned interpreters, and just-in-time bytecode compilers can bring performance close to that of native code without threatening portability.

8 A request comes through a servlet.
The servlet generates the dynamic content. To handle the response to the client, the servlet creates a Bean and stores the dynamic content (sometimes called the result set) in the Bean. The servlet then invokes a Java Server Page that will present the content along with the Bean containing the generated from the servlet. There are two APIs to support this model of request processing using Java Server Pages. One API facilitates passing context between the invoking servlet and the Java Server Page. The other API lets the invoking servlet specify which Java Server Page to use. In both of the above cases, the page could also contain any valid Java code. The Java Server Pages architecture encourages separation of content from presentation—it does not mandate it.

9 Data flow

10 Class diagram

11 Seqence daigram

12 Admin module

13

14 Home Page

15 New Registration

16 Transtions

17 Cusotmer Details

18 Invalid Injection Found

19 Advantages If primary detector fails another detector detect the intruder. By finding the intruders we can send our information in a secured manner.

20 Disadvantages Data will not routed if primary detector fails.
So that there is no guarantee for our information has been sent securely.

21 CONCLUSION This paper presented a novel highly automated approach for protecting Web applications from SQLIAs. Our approach consists of 1) Identifying trusted data sources and marking data coming from these sources as trusted, 2) Using dynamic tainting to track trusted data at runtime, and 3) Allowing only trusted data to form the semantically relevant parts of queries such as SQL keywords and operators

22 Presented by VINODH.M ANIL KUMAR.K DASTAGIRAIAH.K


Download ppt "Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection."

Similar presentations


Ads by Google