Intrusion Detection in Wireless Sensor Network Project Abstract

Intrusion Detection in Wireless Sensor Network project is useful in many application mainly used in military application. Using these wireless sensors soldiers can find out intruders in a battle field. Intrusion detection is a method in wireless sensor network for detecting anomalous moving attackers.

In this project we will look after this issue as per the heterogeneous WSN models. In second stage we will look after two sensing detection models they are single and multiple sensing detection models.

Hardware: 

PROCESSOR          :  PENTIUM IV 2.6 GHz

RAM                       :  512 MB DD RAM

MONITOR              :  15” COLOR

HARD DISK            :  20 GB

CDDRIVE              :  LG 52X

KEYBOARD           :  STANDARD 102 KEYS

MOUSE                :  3 BUTTONS

Software: 

FRONT END                    :  Java

TOOL USED                    :  JFrameBuilder

OPERATING SYSTEM   :  Window’s Xp.

Download Intrusion Detection In Wireless Sensor Network Java Project With Source code.

Client-Server based Instant Messenger

Client-Server based Instant Messenger Description:

  • Instant Messenger is a multi-threaded socket application. It allows multiple clients to connect a single server application.
  • Internet based instant messengers like Yahoo Messengers used for professional communication.
  • When there is no internet connectivity, communication becomes a problem.
  • The main aim to build a client-server based instant messenger is to avoid the lapse of connectivity and to prevent flow of information.

Software Requirements:

                  Network Layer                  :    TCP/IP

                  Operating Systems            :   Windows 2000, XP

                  Language Specification     :    jdk1.5

                  Tool Kit                             :    Netbeans 5.0

Remote DBA Alert Java Project

  • Name of the ProjectRemote DBA Alert Java Project.
  • Language/Tools Used: J2EE, J2ME.               
  • Platform: Windows NT/2000.

Remote DBA Alert Java Project Description        :

A Remote Database support service provides all the functions of a full-time Database Administrator (DBA) including monitoring, maintenance. The Remote Database consists of a central operations center and a Database Administrator (DBA) team, both of which are shared in order to support multiple clients on a 24×7 basis. It is used to provide cost effective, security, reliability and expert remote Database Administrator (DBA) services. It is hard to find a single Database Administrator (DBA) who has the breadth of expertise in all areas of oracle that needed. A lot of time and money is spend on hiring process. Remote Database Administrator (DBA) will manage the DB at a fraction of cost, of doing it in-house.               

DBA can access the database using carriers like TATA, Airtel, Hutch etc. Remote DBA alert systems will be most useful to the DBAs who do not want to be in contract with any one organization and wants to render their services to different organizations.

VOIP Project Report

P2P AND ITS SECURITY IMPLEMENTATIONS IN VOIP NETWORK:

There have been several instances where hackers have been penalized by the law on account of VOIP theft. As per the law, the P2P services have a high ratio. 

There have been instances where organizations have faced theft loss. Security issues in P2P networks have been dominantly significant, and the methodology used to secure these systems will be the focus of the report.

He says that Skype has been the only safest, secure dependable means to deliver P2P VoIP services which functions with a 256 K AES infrastructure.

This is called the public key infrastructure. It is favorable and right to examine the code of signing an authority for the P2P networking client as the report is based on Skype. A market leading authority in protection provision is VeriSign.

A very large number of clients today utilize VeriSign, while the network is indomitable barrier. VeriSign is the monopoly in maintaining the World Wide Web’s root zone file and they process all changes to it, meaning vouching, binding public access to users.

This is performed by carrying out software at a centralized zone, systematizing software at distributed locations.

The public access or keys are then embedded in electronic algorithms that are used to encrypt and decrypt messages transferring from one location to another (Allen, P. 2006).

The end user will be able to electronically make signatures on their messages or emails by using a private key, while the receiver of the email is also given the VeriSign software in order to verify the signature of the original host.

Voice Over Internet Protocol Final Year Project

The digital revolution forced the people to find means for digital communication this led to the emergence of Internet Protocol (IP) based data networks which differ in many ways. The introduction of voice over internet protocol (VOIP) has made it possible to use the IP networks for all the telephonic calls.

Evolution

In the late 2003 or the early 2004 the VOIP services over broadband services was introduced. However the technology found its place only in the year 2009, when many corporate services started using VOIP for long distance communication and as we are human and it is in our nature that we don’t get satisfied with anything so we can expect more development in the technology and hence the future for VOIP is very bright. The need for the growth of the technology could also be due to the increase in the number of users subscribing. As the eMarketer’s estimate shows, the number of residential VoIP subscribers is expected to grow rapidly from 37.8 million paid subscribers in 2006 to 152.6 million in 2011. This also buids pressure on the providers for providing quality service to the user so services are finding different ways not only to attract new users but also to satisfy existing users.

 Aim of the project:

This Voice Over Internet Protocol Final Year Project is to investigate security involvement in VOIP. The procedures are for a secure, safe and reliable. VoIP is to propose the security methods. Based on the safety measure requirements 13 securities have been shortlisted and the thesis has furthered alongside to account any key data that required development. Routinely showing up measure is the security parameter, quality of service values, like latency, voice echoes and packet loss. To arrive at the accurate choice measures over the above parameters the thesis has been elaborated in aspects of Project Design and simulation. Researcher has put into use proprietary software which includes Visual Route, Minitab and VoIP Calculator.

Research Objectives:

As noted in the disadvantages, it is important to focus more on security and quality issues with reference to the VOIP technology to streamline to data pertinence for using a deployment project. The project aims at fulfilling the objective on a step by step approach of each objective:

          a) Over viewing/examining of VoIP technology.

          b) Recognizing common security threats, previously failed procedures.

          c) Review based on existing VoIP encryption methods and their efficiency.

          d) Recognizing problems with VoIP protocols.

          e) Designing a method.

          f) Lastly to simulating the design into a project.

Project on Controlling IP Spoofing through Interdomain Packet Filters

Border Gateway Protocol (BGP):

The Border Gateway Protocol decides the best destination, and emerges with the database table(IP routing), datagram packets are only moved forward based the IP table, BGP table does not based on routes.

IEEE Project on Controlling IP Spoofing through Interdomain Packet FiltersAs each node is a distinct notation, the BGP will determine only a single best path. For deciding ther best path the BGP uses tie-breaking algorithm, this process is continued until the best metrics are concluded to forward the data to the destination. The below are conditions are considered while checking the conditions:

  • Always the first is treated as the best path, if any path exist after the first path then they are compared to the firstly path and selects the best path between them.
  • To check whether the route is valid or not valid
  • With the help of IGP (Interior Gateway Protocol) the route must be synchronized.
  • The route must be appeared in the table (routing table).
  • The next node must be a reachable destination.

The below menu will be used to determine the best path:

  • The highest weight paths are to be preferred.
  • Next, the highest local preference paths are to given importance.

Download Java Final Year Project on Controlling IP Spoofing through Interdomain Packet Filters

Constructing IDPFs using BGP

In this thesis, we have suggested and studied IDPF architecture as an efficient countermeasure for the IP spoofing based DDoS attacks. IDPFs depend on BGP update messages interchanged on the Internet to conclude the validity of source address of a packet send by a neighbor.

We have demonstrated that IDPFs can easily be deployed on the present BGP based Internet routing architecture. We learned the conditions under which the IDPF framework can properly work without discarding any legitimate packets. IDPFs in an important manner limit the spoofing capability of attackers. In addition, they also assist to pinpoint the true origin of an attack packet to be within a small number of candidate networks, thus simplifying the reactive IP traceback process.

Constructing IDPFs using BGPThe attached Constructing IDPFs using BGP Project Contains the below:

TABLE OF CONTENT

ABSTRACT

ACKNOWLEDGMENT

TABLE OF CONTENT

LIST OF FIGURES

LIST OF TABLES

LIST OF ACRONYMS

Chapter 1: Introduction to the Project

1.1 History of the Project

1.2 Proposed System

1.3 Aims and Objectives of the Project

1.4 TCP and IP Protocol

1.5 How Spoofing works

      1.5.1 Uses of Spoofing

      1.5.2   Spoofing purpose

              1.6 Conclusion

Chapter 2: Types of Spoofing

                2.1 DDOS Attacks

                2.2 Non-Blind Spoofing

                2.3 Blind Spoofing

                2.4 Man in the middle attack

               2.5 Conclusion
Constructing IDPFs using BGP1

Chapter 3: Security Requirements

                 3.1 Network security requirements

                 3.2 System security requirements

                  3.3 Information Security requirements

                 3.4 Conclusion

Chapter 4: Threats on data

                 4.1 Hackers

                4.2 Vulnerability

                4.3 Viruses

                4.4 Trojan horse programs

                 4.5 Attacks

                  4.6 Conclusion

Chapter 5: Security Policies

                 5.1 What are policies?

                 5.2 Firewalls

                 5.3 Encryption

                 5.4 Intrusion Detection

                 5.5 Conclusion

Chapter 6: Review on BGP Protocol

                  6.1 Background

                  6.2 BGP Operations

                       6.2.1 Interautonomous system routing

                       6.2.2 Intra-autonomous system routing

                       6.2.3 Pass-through autonomous system

                  6.3 BGP Routing

                  6.4 BGP Message Types

                       6.4.1 Open message

                       6.4.2 Update message

                       6.4.3 Notification message

                       6.4.4 Keep-alive message

                   6.5 Conclusion

Chapter 7: BGP and AS interconnections

                  7.1 Policies and Route Selection

                   7.2 AS Relationships and Routing Policies

                   7.3 Conclusion

Chapter 8: IDPF Architecture

                   8.1 IDPF Overview

                   8.2 Constructing IDPFs

                        8.2.1 Correctness of IDPF

                         8.2.2 Routing policy complications

                   8.3 Practical Deployment of IDPF

                   8.4 Conclusion

 Chapter 9: Design and Implementation

                  9.1 Technologies Used

                      9.1.1 Javax.swing

                      9.1.2 Java.io package

                       9.1.3 Java.net package

                      9.1.4 Java.sql package

                        9.1.5 Java.awt package

                  9.2 Tools Used

                    9.2.1 Jframe Builder Tool

                9.3 Code Snippet

                9.4 Screen shots

Chapter 10: Conclusion and Future work of the Project

References to  the Project

Download CONSTRUCTING INTER-DOMAIN PACKET FILTERS BASED ON BGP UPDATES TO CONTROL IP SPOOFING Java Final Year Project with source code.

Location-Based Spatial Query Processing in Wireless Broadcast Environments

The Location-Based Spatial Query Processing in Wireless Broadcast Environments project executes in jdk 1.6
Steps to Execute:

  • double click on c_server bat file in source code folder
  • double click on mh1 bat file in source code folder
  • double click on mh2 bat file in source code folder
  • double click on mh3 bat file in source code folder
  • follow the rules present in the attached vedio

Hardware Requirements:

PROCESSOR        :    PENTIUM IV 2.6 GHz
RAM         :  1 GB DD RAM
HARD DISK         :  80 GB

Software Requirements:

JDK 1.5
Java Swing
SQL Server
HTML
Java Script
SQL Server

Brief Info:

          Location-Based Spatial Query Processing in Wireless Broadcast Environments           The web pages are just the test-encoding of what the application intends to present to the users. Every web site has get a unique address called Uniform Resource Location (URL) or the Internet Protocol (IP) address. The URL is an address that the web uses to find the specific information on the Internet. The URL can locate something which is local to the system or anywhere remote on the Internet. An example of web site address could be https://1000projects.org where http:// represents the protocol path and www.1000PROJECTS.ORG represents the domain organization. Similarly we do have .GOV for government, .EDU for educational institutions etc.

HTTP is a protocol that moves the html documents over the Internet.

                     HTML is a format for storing the documents and the web site. Every web site has got a bunch of html documents. This html is not a programming language. All the documents that you view on the www are created using the html. The www uses a set of protocols like http that gives the Internet users to access to a vast amount of information on the Internet .

Download Location-Based Spatial Query Processing in Wireless Broadcast Environments Final Year Java Project

Download Location based spatial query processing in wireless broadcast environments project 2008 base paper, project report and source code in java.

Monitoring Online Tests through Data Visualization Project

In the Monitoring Online Tests through Data Visualization Project, We would like to devise new visual representations and perform further experiments, possibly in combination with classical data mining algorithms. Moreover, since the approach leads itself to the application to other application fields such as e-commerce, in the future, I would like to evaluate its use in these contexts. Finally, I wish to explore more deeply the problem of cheating detection, which we just treat in broad terms here, since we believe that an approach based on logging and visualization can be promising and effective to this aim.

Monitoring Online Tests through Data Visualization IEEE ProjectSteps to run the Project:

1)Import  project.

2)Run database Script.

3)Run application in myeclipse server.

4)It will automatically shows login page.

5)You have to choose examination.

6)Answering the questions by using options.

7)Click on logout.

Download Monitoring Online Tests through Data Visualization Java Final Year Project Documentation with Source Code

Scaling Dynamic Authority-Based Search Using Materialized Sub graphs

Scaling Dynamic Authority Based Search Using Materialized Subgraphs projects main idea is to develop a application which can accurately rank a webpage based on the content present in the site. This project works on basic factors like keywords, search algorithms and links provided in the site and recall high quality pages from search database. Algorithms used in this project are query time page. Developing these graphs will be expensive for large graphs which is not feasible at query time. Process including for quering  keywords requires huge preprocessing.

This project BinkRank works on hybrid approach which is inspired by considering materialized in regular query processing. This application works on small data graphs by using this graphs keywords can be answered by running object Rank on only one of the subgraphs.