Review - Intelligent Agents for intrusion detection 
From SANDHYA VARANASI's webpage. http://www35.homepage.villanova.edu/san ... .varanasi/


Target Audience


This is defenitely an academic paper. I think the target audience would be professionals, students, or academics who are doing research on this topic.

Type of Document


This is an academic document that explores a formally defined process. The document was supported by a contract with the US Department of Energy

Summary of Article

This article describes a technique used for intrusion detection. It is a data mining technique in which a distributed system of intelligent agents can detect intrusion. They used a Java framework for Meta-Learning to implement this expirement. The intelligent agents were trained with data before being able to detect intrusion.

Conclusion

The experiment was a success, and they were able to implement intrusion detection by using this data mining technique on a distributed system of Java-implemented intelligent agents. This seems like a valid place to look for a model for implementing a network of intelligent agents.


[ add comment ] ( 6 views )   |  permalink  |  related link
Web client based distributed systems links 
Here are my three links for my Topic!
  1. applet based anonymous distributed computing system
    http://www.emeraldinsight.com/Insight/v ... tId=863699
  2. Hack a day article on Java based and Javascript based distributed computing.
    http://hackaday.com/2009/03/03/distribu ... avascript/
  3. Genetic algorithm implementation in Distributed Javascript
    http://portal.acm.org/citation.cfm?id=1277282


[ add comment ] ( 1 view )   |  permalink
Redefinition of project: in depth project description, use cases and deployment diagram 
I am going to implement a Tor client/relay in Java. There is an existing project, OnionCoffee, which is an attempt at creating a Java implementation of Tor. However, this project is out dated, full of bugs and incomplete. OC (OnionCoffee) does not have the capability to run a relay (to become a node in the Tor network). I propose to update the OnionCoffee code and implement the Relay functionality in OnionCoffee. This is an integral part in the distributed system, because the relay will be responsible for setting up circuits in the Tor network, as well as handle distributed key exchange. The specifications for a Tor client can be found at https://git.torproject.org/checkout/tor/master/doc/spec/tor-spec.txt. For my project I would like to fork the OnionCoffee project and bring it up to the Tor client specifications, including the relay capability.

Use Case Diagram
Deployment Diagram

[ 1 comment ] ( 9 views )   |  permalink
Project Idea 
The Tor network is a distributed system designed to keep a user anonymous while accessing the internet. Tor is a network of "onion routers" that provide a private encrypted network to tunnel your traffic through before it gets onto the web. This is especially helpful if a user wants to access the internet from an IP that is outside of their country.

The Vidalia Control Panel is a GUI Control Panel for a client's connection with the Tor network. Part of this Control Panel is a map of the world showing the location of every exit node. My goal for this project is to be able to choose your exit node from this map and reconfigure the client's Tor route to exit from this selected exit node.

[ add comment ] ( 9 views )   |  permalink  |  related link
Course Topics 
Welcome to my website for my Distributive Systems class, CSC 8530 at Villanova University. Don't be too impressed, the back end for this blog was taken from http://sourceforge.net/projects/sphpblog/ .

Here are my potential topics for the class:
  1. Distributed systems in the Tor Network
  2. Distributed problem solving (Mersenne Primes, protein folding)
  3. Distributed peer to peer networks (bit torrents)
  4. Web based Distributed Systems using Javascript, Flash or Java applets (client-side applications)
  5. Ad-hoc wireless networks
  6. Distributed Operating systems over multiple computers
  7. Distributed artificial intelligent agents
  8. Distributed computing with multiprocessor and multi-core machines
  9. Distributed Systems and folksonomies as well as other web 2.0 "data structures"
  10. Distributed hacking (botnets, ddos attacks)


[ 1 comment ] ( 14 views )   |  permalink

<<First <Back | 1 | 2 | 3 |