4.softwareprojectplan_nids

Upload: israel-saiyid

Post on 07-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 4.SoftwareProjectPlan_NIDS

    1/4

    Vishwakarma Institute of Technology, Pune-37.

    NIDS: Network Intrusion Detection System

    Software Project Plan

    Approvals Signature Block

    Project Responsibility Signature Date

    Project Guide (Internal)

    Project Guide (External)

    Documentation Leader

    Table of Contents

    1. OVERVIEW .....................................................................................................................2

    Department of Computer Engineering

  • 8/6/2019 4.SoftwareProjectPlan_NIDS

    2/4

    Software Project Plan

    2. GOALS AND SCOPE .........................................................................................................3

    2.1 Project Goals ................................................................................................................... .........32.2 Project Scope ...........................................................................................................................3

    2.2.1 Included .........................................................................................................................................3

    3. SCHEDULE AND MILESTONES ...........................................................................................................4

    1. OVERVIEW

    Network security has been a very important concept and issue, ever since the Internetcame into existence. The need for security systems against the external attacks from thehackers has always been a very crucial requirement. One vital type is the Intrusion DetectionSystem (IDS). Here are two major categories of the analysis techniques of IDS: the anomalydetection and the misuse detection. The focus mainly is on the misuse detection, which iscollected the attack signatures in a database as the same as virus protection software to detect

    2

  • 8/6/2019 4.SoftwareProjectPlan_NIDS

    3/4

    Software Project Plan

    the relate attacks. We propose an algorithm to use the known signature to find the signature ofthe related attack quickly.

    2. GOALS AND SCOPE

    2.1 PROJECT GOALS

    Project Goal Priority Comment/Description/Reference

    Functional Goals: Goals that directly influence the performance of thesystem

    Data Set 2 Data set Contains the Attack Signature which areoccurred previously in the network. Misuse Detectionmainly based on the attack signatures.

    Data Set analysis 1 Reading the data set and used it for further processing.

    Support calculation andcandidate set generation

    3 Analysis of the a ttack signature dataset and supportcalculation of each attack. Also generation of thecandidate set for the next iteration.

    Frequent Item setGeneration

    3 Generation of Frequent item set in each iteration fromthe candidate set. This is depends on the comparisonwith the minimum support.

    Technological Goals: Goals that will have direct influence on technologicalaspects of the system

    Integrated Simulation andtesting.

    1 Use o f generated frames for Testing of e xistingdeployments.

    Quality Goals

    Use of Dataset containingthe Pre-defined set ofattack signature.

    1 This should enable system to analyze the attacksignature and association between the attacksignatures.

    Frequent Item Set 2 This should help in generation of the attack signature.

    Constraints:

    Known attack signature

    Dataset

    1 The misuse detection system is concerned with the

    known attack signature.

    2.2 PROJECT SCOPE

    2.2.1 Included

    The tangible deliverables of this System are:-

    3

  • 8/6/2019 4.SoftwareProjectPlan_NIDS

    4/4

    Software Project Plan

    1. A Source code of Modules that includea. Graphical User Interface Module

    b. Signature Data set analysis Modulec. Generation of Frequent Item Set Moduled. Generation of Candidate Set Module

    2. A Project Report

    3. Help Files and configuration files

    3. SCHEDULEAND MILESTONES

    Milestones Description Milestone Criteria Planned Date

    M0 Start Project 2009-10-10

    Understand the requirements

    and define project goals andscope

    Research on the domain to

    clearly identify therequirements and projectsynopsis and SRSdelivered

    2009-10-15

    M1 Start Planning 2009-10-25

    Objectives and strategydefined and feasibility studied

    Implementation language,standards and protocols tobe followed are fixed

    2009-10-30

    M2 Start Execution 2009-10-05

    Complete project plan definedand reusable modulesidentified

    User interface, librariesfound and project planreviewed.

    2009-10-08

    M3 Confirm Execution 2009-10-01First version completed All the basic functionalities

    tested and verified2009-10-05

    M4 Start Introduction 2009-10-10

    First module of the projectready to be delivered

    New functionalities andenhancements finished

    2009-10-15

    M5 Release Project 2009-10-20

    Final system completed withenhancements

    Project system tested,documentation reviewed

    2009-01-25

    M6 Close Project 2009-02-01

    4