10-09-2014, 06:41 AM
(This post was last modified: 10-09-2014, 06:43 AM by priyanka92.)
Existing system:
In the Existing system, event logs are clustered based on confidentiality, integrity and availability. The clustered output and the logs are compared to CVE(Common Vulnerability Exposures) database to predict the attacks.
Proposed System:
In the proposed system, ontology is to be created for storing patterns of attacks against confidentiality, integrity and availability of information assets. Risk intelligence is retrieved by comparing the monitored traffic pattern against the stored patterns to identify forth coming attacks. The ontology created can help in sharing attack related information among different organizations performing Information Security Risk Assessment.
dear sir
can you able to do this project
In the Existing system, event logs are clustered based on confidentiality, integrity and availability. The clustered output and the logs are compared to CVE(Common Vulnerability Exposures) database to predict the attacks.
Proposed System:
In the proposed system, ontology is to be created for storing patterns of attacks against confidentiality, integrity and availability of information assets. Risk intelligence is retrieved by comparing the monitored traffic pattern against the stored patterns to identify forth coming attacks. The ontology created can help in sharing attack related information among different organizations performing Information Security Risk Assessment.
dear sir
can you able to do this project