Misuse Detection and Monitoring ORACLE full report
#1

[attachment=1383]

1. INTRODUCTION
This project gives an idea about the misuse detection and monitoring management of the database system oracle. Generally now a days most of the people uses computers for keeping the database, regularly. This modern project keeps the vigil on the computers as well as detect the private and unauthorized threat for the system. AS threat occurs it gives the indication to the user. As well as the administrator. It uses the firewall to user initially it asks for the identity. If it matches to the previous stored database then and then only it will allows that user else the user is protected.
The Test Coordination system is a Standard process followed in MCA Department of PESIT for the whole coordination of the Internal Test conducted.

The existing system involves a lot of manual and handwritten work and hence almost always prone to some kind of an inevitable human error.
¢ Since data is temporarily stored and needs to be entered explicitly for each report.
¢ Manual tasks such a seating arrangements and report generation for list of absentees, etc are repetitive tasks.
¢ Maintaining Huge amount of data pertaining to marks of students is very difficult without a specialized system
¢ The different types of reports to be prepared including the final IA marks which include the average marks and also lab internal marks is very tiresome.
The proposed system in many ways overcomes the drawbacks of the existing system especially in the reduction of repetitive tasks such as Marks entry for report generation and Seating arrangement. Along with overcoming the drawbacks it provides certain new innovative features such as student Performance Analysis across internals through the Pictorial Representation of Charts which gives an instant idea of performance and consistency , which helps the department to regulate studentâ„¢s performance.
Some of the salient features of the proposed system are
¢ The software maintains detailed information about the student and his academics details.
¢ Performance Analysis of student for each Subject and across Internals opted through Bar Charts
Single system for workstation, spares and customer care sections their by eliminating
information being isolated in the sections, leading to inefficiency of the organization.
Typical misuse detection system

Misuse Detection: The concept behind misuse detection schemes is that there are ways to
represent attacks in the form of a pattern or a signature so that even variations of the same
attack can be detected. This means that these systems are not unlike virus detection
systems -- they can detect many or all known attack patterns, but they are of little use for
as yet unknown attack methods. An interesting point to note is that anomaly detection
systems try to detect the complement of "bad" behavior. Misuse detection systems try to
recognize known "bad" behavior. The main issues in misuse detection systems are how to
write a signature that encompasses all possible variations of the pertinent attack, and how
to write signatures that do not also match non-intrusive activity. Several methods of
misuse detection, including a new pattern matching model are discussed later. A block
diagram of a typical misuse detection system
Modules and functionality
¢ Monitoring
¢ Detection
¢ Prevention
Monitoring
It is sometimes difficult to control or prevent misuse as the perpetrators concerned
may not be violating any system-side access control. At this point, the type of control
needs to move from prevention towards monitoring. Monitoring employees can be used
to prevent and detect fraud at the network level and application level.

Detection
While it may seem easy to commit illegal acts, cyber criminals are frequently
unaware that it is also possible to detect them. Intrusion detection is a viable and practical
approach for providing a different notion of security in our huge and existing
infrastructure computer and network systems. Misuse detection includes internal
auditing, and authorization. On the technical side, there are automated systems such as
intrusion detection system (IDS).the combination of IDS systems, namely, network-
based IDS and host-based IDS should be used to detect insider attacks.
Prevention
There are some other characteristics that can be measured and assessed at the
system level in order to yield a metric for the estimated potential threat posed by
different user. This finding could feed in to other processes, such as assignments and
review of access rights, as well as monitoring and supervision of user activity.

2. ABSTRACT
The amount of information available to us is literally exploding to manage this large task we require tools that simplify the management and presentation of data in a timely and ordered fashion.
The software Test Co-ordination system is a tool for atomizing the test process carried out in MCA department of PESIT the software facilitates the test coordinators.
Test coordination system simplifies the activities of test coordination process by automating the various tasks being followed by the MCA department. The software maintains detailed information about the student and his academics details. It also maintains records pertaining to attendance and marks details for each student.
Objectives:
¢ The Software will provide high flexibility and simplified approach for the system.
¢ Reports will help in easy maintenance of various records pertaining to the different aspects of the system.
¢ Manual tasks such as seating arrangements and finalization of IA marks will be automated.
¢ Charts will give Advanced Analysis about Performance across internals.
3. HARDWARE and SOFTWARE REQUIREMENTS
A system development environment is a set of hardware and software tools that act in combination in an integrated way to provide support for the whole of the software process form initial specification through to testing and delivery.
The minimum hardware requirements for system to work efficiently are:
Processor : Preferable Pentium III and above
Memory : 128 MB RAM
Hard disk : 20GB
The minimum software requirements for system the are:
Operating System : Windows 9x or higher
Front End : Java
Back End : MS SQL Server 2000
Reporting Tool : Crystal Reports 8.0

3.1 System Requirement Specification (SRS)
SRS is a document that completely describes what the proposed system should do without describing how the software will do it. It is completely responsible for describing the external behavior of the proposed software.
Need for SRS:
1. An SRS establishes the basis for agreement between the client and the supplier on what the software product will do.
2. A high-quality SRS pre-requisite to high quality software and reduces the development cost providing a reference for the validation of the final product
Writing SRS is the most challenging part of the project development phase. Its basic purpose is to bridge the communication gap between the customer and the developer. Another important purpose of developing an SRS is helping the clients understand their own needs. SRS establishes the basis for agreement between client and supplier on what the software product will do.
3.2 System requirements
¢ Requires considerable amount of work and is sometimes error prone.
¢ All the Student, subject and Test details are maintained by typing manually in Excel Sheets and this increases complexity.
¢ The Faculty needs to make seating arrangements manually and is very cumbersome.
¢ The Faculty needs to calculate Total marks and average of marks for each student manually.
¢ Searching of records takes much time, & sometimes may lead to wrong results.
3.3 Functional Requirements
¢ Login must be provided with user name and password to avoid unauthorized access to the system.
¢ The system should be operated by Test Coordinator of the department as well as by other authorized staff.
¢ The system must validate the inputs given by the user to ensure consistent and error free data.
¢ The user must be able to generate the student report, test marks details report at a given point of time.
¢ The user must be able to save the generated reports to disk or print them.
¢ The user must be provided an option to modify or delete the details of student test marks and other details.
4. ENTITY RELATIONSHIP DIAGRAM
5. DATA FLOW DIAGRAM
TRUE
FALSE

6. ADVANTAGES AND FUTURE SCOPE
¢ TEST Coordination system fully atomizes using VB as the front end and SQL Server 2000 as back end.
¢ The user who will be using the automated system needs to enter only the student, subject and Test marks details. The details will be stored in database and can be accessed easily by selecting semester, section, or subject code, or Test Number, or Room No like keys from the combo box.
¢ The data is secured and requires login name and password before using the application.
¢ The user can easily find the student details and marks details & generate reports by just click of a button.
¢ Reduces stress, workload, and gives proper and accurate results in no time.

7. TABLE STRUCTURE
Sr.No Name Designation Password
01 Mr. A.B.Rathi. Manager 12@!@
02 Miss. Lathi R. Sr. Clerk 45&^&
03
04
--
8. CONCLUSION
This is the very protective system for the forigen threats which can detect the any type of threat and protect the system very effectively. So using of this system is quietly useful for the organization to protect their data from the unauthorized user as well as it keeps good track for best future development.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: oracle 9i dba free seminar, openmosix internals, project report on misuse of science and technology, cmds computer misuse detection system, artificial neural network for misuse detection seminar, result cache in oracle, job interview at oracle,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,756 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,877 08-01-2018, 02:33 PM
Last Post: RaymondGom
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,060 15-02-2017, 03:40 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,764 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,877 03-09-2016, 11:20 AM
Last Post: jaseela123d
  SUSPICIOUS EMAIL DETECTION seminar class 11 7,818 21-04-2016, 11:16 AM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,115 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 25,979 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,848 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,210 29-11-2015, 02:37 PM
Last Post: Guest

Forum Jump: