90 likes | 314 Vues
In the world of Networks, Everything on the Internet involves packets. Web page constitute of a series of packets, and every e-mail get transfers as a series of packets. In the existing methodology, a monitoring system has been designed for tracing the packet transfer between the source and destination. A strategy of pattern matching has been utilized to monitor the source and destination content for its originality based on the water marking security concepts. http://kaashivinfotech.com/ http://inplanttrainingchennai.com/ http://inplanttraining-in-chennai.com/ http://internshipinchennai.in/ http://inplant-training.org/ http://kernelmind.com/ http://inplanttraining-in-chennai.com/ http://inplanttrainingchennai.com/
E N D
PACKET TRANSFER OVER NETWORK TRAFFIC DETECTION MONITORING OF SECURE Based on IEEE Transaction Paper, Traffic Pattern-Based Content Leakage Detection for Trusted Content
A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager
Abstract • In the world of Networks, Everything on the Internet involves packets. Web page constitute of a series of packets, and every e-mail get transfers as a series of packets. • In the existing methodology, a monitoring system has been designed for tracing the packet transfer between the source and destination. • A strategy of pattern matching has been utilized to monitor the source and destination content for its originality based on the water marking security concepts. • In the proposed methodology, the monitoring system has been designed with leakage analyser for checking the intrusion or leakage of packets between the transfer of source to destination.
Existing System • The conventional systems maintain a high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), however, their detection performance substantially degrades owing to the significant variation of video lengths. • In this paper, we focus on overcoming this issue by proposing a novel content-leakage detection scheme that is robust to the variation of the video length. • By comparing videos of different lengths, we determine a relation between the length of videos to be compared and the similarity between the compared videos.
Proposed System • Sender in an application, used to send the content with watermarking information. • To enhance the process ,we are using monitoring system to detect the content leakage and intrusion . • Monitoring system analyze the originality of the content and it is time consuming while transferring packets. • These contents along with watermarked source send to the receiver through monitored system only.
System Requirements • Software Requirements Platform : DOTNET (VS2010) , ASP.NET Dot net framework 4.0 Database : SQL Server 2008 R2 • Hardware Requirements Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB
Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record
Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.