Fuzi Distribution Java Project

Fuzi distribution project explains about developing a software application for a company to manage its products using a user friendly interface. This application is flexible with varying trends of the company. This application provides user interface for selecting products of the company by understanding entire features of the product like its features, cost, model number …etc. Users can file quotation for the selected product and by using order form. This system provides user friendly front end for modifying, backup and deleting data base.

This application can be used from all over the world using internet. This system works on MVC architecture using servlets, JSP concept in java. Servlets are used to allow application globally and it also provides direct access to database. Using servlets it easy to work with HTML and JAVASCRIPT and make application design more easy and beautifull.

Geometric Approach to Improving Active Packet Loss Measurement Project

Geometric Approach to Improving Active Packet Loss Measurement project the main objective is to analyze the deficiencies in tools used to measure packet losses in the end to end network path.

By testing loopholes in these tools by experimenting with in real environment we implement a new algorithm for accurate measurement of packet loss using geometric distribution.

In any network calculating the loss of a packet is a challenging task because of rare occurrence and that too in short duration of time.

In order to measure these losses probe tools are mostly used to calculate the loss of packets in the end to end network paths. But there are many types of researchers working on the efficiency of this tools.

In this project initially, we will test the accuracy of this tools and understand loophole in the existing system and work on how to improve the efficiency of these systems by implementing the new protocol.

This system works on two principles.

  1. Enable an explicit trade-off between accuracy and impact on the network.
  2. Enable more accurate measurements than standard Poisson probing at the same rate.

In order to analyze our new method, we develop and implement a prototype named BADABING.

download Geometric Approach to Improving Active Packet Loss Measurement Java project Source code, Documentation, paper Presentation, Base Paper, How to run Video File.

A Precise Termination Condition Of The Probabilistic Packet Marking Algorithm

A Precise Termination Condition Of the Probabilistic Packet Marking Algorithm projects is used to detect information of attacked packet when there is distributed denial of service attack. 

In the existing system, Probabilistic packet marketing method is used for detecting packet attacks but it is not efficient in discovering internet map or attack graphs.

In this algorithm, there are no proper termination conditions so attack graphs shown in this algorithm would be wrong.

In this application, we will work on precise termination condition for PPM algorithm and implement a new algorithm called Rectified PPM(RPPM) algorithm.

One of the effective features of this algorithm is when it terminates it will make sure that constructed attack graph is correct.

In order to check the performance of this algorithm, we use simulations and calculate the performance of the system and differentiate differences in result between PPM algorithm and RPPM algorithm. RPPM is definitely a better improvement of PPM algorithm.

download Probabilistic Packet Marking Algorithm Project Report.

 

Adaptive Programming Model for Fault Tolerant Distributed Computing

Adaptive Programming Model For Fault Tolerant Distributed Computing projects main idea is to implement a error controlling method using fault tolerant distributed computing method. In distributed systems capability of adapting to run time conditions is one of the important factors for providing quality of service between processes. But maintaining error control in distributed systems is challenging task. In order to implement adaptive programming model which works on top layer with process state information as per the quality of service? The system we are working on is a hybrid model which has synchronous part and asynchronous part.

Existing System: 

  • Present system which is known as time free asynchronous distributed system which causes crashes in runtime processing.
  • This system designers can estimate process by considering upper bound on the number of processes that can crash and implement new design where we can control process crash.
  • In existing system there process crash information is not known to protocol.

Constructing Inter Domain Packet Filters to Control IP Spoofing Based On BGP Updates

Constructing Inter Domain Packet Filters to Control IP Spoofing Based On BGP Updates projects main idea is to implement a inter domain packet filter (IDPF) architecture to solve distributed denial of service attacks on internet. DDOS attacks are one of the common attacks that we see on internet. Because of spoofing of addresses in IP packets it had became tough task to implement prevention mechanism.

   Attackers use different techniques to capture packets transmitting from source to network and create burden on the destination network for policing attack packets. By using Inter domain packet filter we can reduce IP Spoofing on the internet and this can be done without using global routing information. This application uses Border Gateway Protocol information router updates information and integrated on border routers.

   Considering simulation results using partial IDPF can reduce chances of allowing attackers to limit spoofing problem.

Introduction:              

               Distributed DoS attack creates an even more severe threat for the internet. Two popular internet sites are affected recently because of the DDos attacks. These attacks are mostly common in attacking the large backbone networks on the daily basis which is considered as a terrific issue.

IP spoofing is the key factor which complicates the mechanisms for reducing this kind of attacks. The steps taken to for forging in IP packets source addresses is known as IP spoofing. Eliminated the attacker by self identification and location and at the same time masquerade to be a different host to represent source based packet filtering. This indicates that IP spoofing is susceptible for large number of internet services.

In the recent years, the attackers are gradually performing the attacks through botnets. Here attackers are carried out via intermediates and will be useful for IP spoofing in order to hide their original identity. Intermediates are nothing than the compromised bots, which means the attackers are carried out through compromised bots.

This indicates that the IP spoofing usage is decreased.   IP spoofing is utilized in DDoS attacks of high-profile mainly on the DNS servers root. After this attack, the Security of ICANN and Stability board has done three proposals as a response for this event. Adopting of source IP address verification is the first and long-term proposal. This proposal confirms the IP spoofing issue. 

            There are three reasons for an IP spoofing to be popular, and the first one is IP spoofing separates the attack traffic through the genuine traffic: The packets including addresses of spoofed source can be visible through the whole internet. One more reason is IP spoofing will supports the attacker by presenting simple approach to enter a indirection level. And in order to localize the attack traffic, a significant effort is needed as a result. And the final reason is IP spoofing is used in several popular attacks as they need the capability to spoof addresses. few popular attacks are TCP SYN flood attacks, reflector-based attacks and man-in-middle attacks.

Even though the entered the arbitrary source addresses into IP packets by attackers, the actual path by which packets obtain toward the destination may not be managed by the attacker. IP spoofing is mitigated by the route-based filters which are proposed by Park and Lee. The construction of route based packet filters needs the global routing data understanding. This is a challenging task and hard to determine in the offer internet routing communications.

Generally independent systems and thousands of network domains are connected in the internet. Border gateway protocol is protocol of inter-domain which is used by every autonomous system to communicate with its neighbors. By communicating with the neighboring systems, information of the networks can b e exchanged.

Policy-based routing protocol is BGP; this will use locally defined routing policies to guide choose and broadcast of destination at a particular autonomous system. Because of the narrow nature of applying the policies to each autonomous system, an autonomous system cannot need the total routing information decisions approved by the next autonomous systems. This was a challenging issue in the current internet routing business.

Filters by the Route-based packet have created an inspiration to propose inter-domain packet filter architecture (IDPF architecture. This system can be built alone depends on the BGP updates which are locally exchanged. It is assumed that a routing set protocols which generally applied now are employed by the autonomous systems.

Existing System: 

Network Ingress Filtering is used in the existing system.

Specific network is prevented from utilizing itself to attack other by using the Ingress filtering. This is the key factor of Ingress Filtering.

Proposed System: 

In the proposed system, IDPF architecture is proposed and studied as an efficient tool or solution for the DDoS attacks in spoofing is used. To suppose the source address validity of a packet approached by a adjacent, IDPFs rely on updated Border Gateway protocol messages exchanged in internet.

Problem definition:

Increase of internet usage these days is also causing many security threats in place and Distributed Denial of Service (DDos) attacks are most popular among them. In general these DDoS attacks target the popular websites and the backbone networks of any organization. There are many reasons for these attacks and IP spoofing is one among them, where sender IP address is spoofed to faults and the packets are reached with out any prior checking and with the implementation of IP spoofing, the attackers can hide their actual identity and can enter to the secure networks and destroy them.

There are few techniques to control this IP spoofing and route based packet filters are one among them and even this technique fail in terms of maintaining the global information of all the nodes which is really a tough job in case of BGP based internet routing.  evaluates the construction of packet filters of  inter domain to manages the IP spoofing and packet sniffing across the BGP updates of internet. 

Aims & Objectives: 

Aims:  To evaluate filters the inter domain packet to avoid the IP spoofing and eliminate packet sniffing across the BGP updates using a java based application.

Objectives:  Following are the project objectives

  • To understand the concept of DDoS attacks, IP spoofing and packet sniffing and their role in breaching the security across internet
  • To prepare literature review on existing techniques to prevent the IP spoofing and evaluate their limitations
  • To evaluate the Interdomain packet filter concept in preventing the IP spoofing and packet sniffing across BGP updates of internet
  • To improve a application of java based which will demonstrate the suggested application virtually
  • To check the purpose and observations of the document

Screenshots:

Text Router Screen
Text Router Screen

At first, just click on the BGP Router (textrouter.bat)

After that, double click on the file of BGP router i.e. on textrouter.bat file, and then the following page will be displayed as shown in the figure below.

we want the data to be saved into another page
we want the data to be saved into another page

This figure represents that if we want the data to be saved into another page, this can be done by clicking on save button provided in the above option, when click on save option following page displays as seen in figure asking where we want to save the data. As per the desire the data can be saved any where.

Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi Attribute Transactional Data

Temporal Cluster Graphs for Identifying and Visualizing Trends in Multi Attribute Transactional Data projects main idea is to implement a new data analysis and visualization procedures for improving trends in multi attribute temporal data using cluster based approach. In present scenario many organizations and business firms are more interested in capturing data of their customers, suppliers and information of business competitors to improve business. Most of the data that are used here is multi attribute and temporal in nature. One of the other technique used for capturing this data is using data mining techniques capturing this data is not a easy task. This paper explains about how clustering based approach can represent trends in multi attributed temporal data.

This application uses C-Trend to implement temporal cluster graphs which maps multi attribute temporal data in the form of two dimensional directed graph which identifies trends in domain data over time.

This system works on clustering based techniques, implementing new algorithms to increase performance

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Projects main idea to explain about importance of data integrity and confidentiality for web applications and provide solution for this issue. In present scenario data there are procedures like content filtering, Trans coding, capacities for meeting system requirements. Data security is one of the biggest problems in present web applications. In this paper we will explain a new approach which will improve data integrity and security for data by implementing multiple intermediaries to continuously check content services at different levels of the data. Data security is obtained by using decentralized proxy and key management and flexible delegation of services. Experiment is conducted to check performance and efficiency of the system while data is transmitted across the network.

This system also improves load distribution around different proxies and improves overall performance and supports parallel content service.

Online Index Recommendations for High Dimensional Databases Using Query Workloads

Online Index Recommendations for High Dimensional Databases Using Query Workloads projects main idea is to provide solution for problems caused from using lower dimensional indexes using a parametreizable method for specified indexes based on index types which are mainly used in high dimensional data sets and to use a dynamic method for auto changing of indexes as work load changes. In general users use small set of attributes for searching data at a time. In order to accurately represent access patters it is better to use low dimensional indexes. The problem with this query process is when query patterns changes performance of database changes because in physical database design workload will decrease. 

Existing System:

  • In existing system performance of query response is slow if there is any pattern change.
  • This problem arise because of using static query workload.
  • Performance of the system depends on the size of database.
  • There is no data pruning capability available in this system.

NDT A Model-Driven Approach For Web Requirements

Model Driven Approach for Web Requirements projects main idea is full fill the requirements in web development by implementing Navigational Development Techniques (NDT). In software development field web development is one of the fast growing field which covers implementation of application processes and different models which are useful in web environment for improving the quality of web.

     In web application development there are few areas where there is need to develop new applications to solve problems. There are many researchers working on some classical problems detected in web development. In this paper we are going to explain Navigational Development Techniques method which is a new approach to work on web applications. This application is implemented from a result of many researches and comparative studies which tries to solve some problems detected by research community. Implementing NDT tool can provide scope for global vision of this project. This application also helps in integrating web engineering to enterprise environment. 

Online Learning Java Project

Online Learning Projects main idea is to develop a online learning application for education institutes and provide a new method of education for students. As the usage of internet is growing in our daily life providing a online education through this medium can increase scope of education system as well as provide good business extension for educational institutes. This system will create new opportunities for trainers to improve teaching standards. This online application will provide source for exchanging information on research, development and practice courses on these topics using online learning application.

User should register with the application and get unique user id and password for accessing this online learning website. Website will provide list of online courses available and information about lectures standards on subject knowledge. Users can directly contact with lecturer for further information. This application provides online chatting and video chatting for better online education. Payment process is done through online process.