www.researchgate.net
Open in
urlscan Pro
2606:4700::6811:2069
Public Scan
URL:
https://www.researchgate.net/publication/227363827_Prototype_of_Intrusion_Detection_Model_using_UML_50_and_Forward_Engineering
Submission: On June 02 via api from ZW — Scanned from DE
Submission: On June 02 via api from ZW — Scanned from DE
Form analysis
3 forms found in the DOMGET search
<form method="GET" action="search" class="lite-page__header-search-input-wrapper"><input type="hidden" name="context" readonly="" value="publicSearchHeader"><input placeholder="Search for publications, researchers, or questions" name="q"
autocomplete="off" class="lite-page__header-search-input"><button
class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-green nova-legacy-c-button--theme-bare nova-legacy-c-button--width-square lite-page__header-search-button"
type="submit"><span class="nova-legacy-c-button__label"><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
<use xlink:href="/m/4210735495654424/images/icons/nova/icon-stack-s.svg#magnifier-s"></use>
</svg></span></button></form>
Name: loginForm — POST https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g
<form method="post" action="https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g" name="loginForm" id="headerLoginForm"><input type="hidden" name="request_token"
value="aad-Qihhlk47A323CWE4KYXGrITZmDe0bgrgJ49I4hGg1BNcox9CRNt57khiB3HQtBxos5W9tANpoZOblR44mJzEE/sL2mybRaZp5jkEGOG67WtsvkW/x67Ja3WrqG2NEuoylo1WQytrONnKwZB8i0VWZpO1LMMijGtpL1fMgITIVQkMEbtoe4LXqmfmJYIzQZbQJQ38BE7ZydPlF1WF5ooW0+QKFtzzVBD8+EhbnMR8QSN/D/6p4Q3iv2KkG5a69J+k3JuXggVoowFswADpgfE="><input
type="hidden" name="urlAfterLogin" value="publication/227363827_Prototype_of_Intrusion_Detection_Model_using_UML_50_and_Forward_Engineering"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden" name="headerLogin"
value="yes">
<div class="lite-page__header-login-item"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit lite-page__header-login-label"
for="input-header-login">Email <div class="lite-page-tooltip "><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
<use xlink:href="/m/4210735495654424/images/icons/nova/icon-stack-s.svg#info-circle-s"></use>
</svg>
<div class="lite-page-tooltip__content lite-page-tooltip__content--above">
<div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as their
ResearchGate login</div>
<div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
<div class="lite-page-tooltip__arrow-tip"></div>
</div>
</div>
</div></label></div><input type="email" required="" id="input-header-login" name="login" autocomplete="email" tabindex="1" placeholder=""
class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
<div class="lite-page__header-login-item"><label class="lite-page__header-login-label"
for="input-header-password">Password</label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page__header-login-forgot" href="application.LostPassword.html">Forgot password?</a></div><input
type="password" required="" id="input-header-password" name="password" autocomplete="current-password" tabindex="2" placeholder=""
class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
<div><label class="nova-legacy-e-checkbox lite-page__header-login-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" name="setLoginCookie" tabindex="3" value="yes" checked=""><span
class="nova-legacy-e-checkbox__checkmark"></span><span class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
<div
class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-stretch@s-up nova-legacy-l-flex--justify-content-center@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
<div class="nova-legacy-l-flex__item"><button
class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
<div class="nova-legacy-l-flex__item nova-legacy-l-flex__item--align-self-center@s-up">
<div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
</div>
<div class="nova-legacy-l-flex__item">
<div
class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
<div class="nova-legacy-l-flex__item">
<a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
</div>
</div>
</div>
</div>
</form>
Name: loginForm — POST https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g
<form method="post" action="https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g" name="loginForm" id="modalLoginForm"><input type="hidden" name="request_token"
value="aad-Qihhlk47A323CWE4KYXGrITZmDe0bgrgJ49I4hGg1BNcox9CRNt57khiB3HQtBxos5W9tANpoZOblR44mJzEE/sL2mybRaZp5jkEGOG67WtsvkW/x67Ja3WrqG2NEuoylo1WQytrONnKwZB8i0VWZpO1LMMijGtpL1fMgITIVQkMEbtoe4LXqmfmJYIzQZbQJQ38BE7ZydPlF1WF5ooW0+QKFtzzVBD8+EhbnMR8QSN/D/6p4Q3iv2KkG5a69J+k3JuXggVoowFswADpgfE="><input
type="hidden" name="urlAfterLogin" value="publication/227363827_Prototype_of_Intrusion_Detection_Model_using_UML_50_and_Forward_Engineering"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden" name="modalLogin"
value="yes">
<div class="nova-legacy-l-form-group nova-legacy-l-form-group--layout-stack nova-legacy-l-form-group--gutter-s">
<div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><label
class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label" for="input-modal-login-label"><span
class="nova-legacy-e-label__text">Email <div class="lite-page-tooltip "><span class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500">·
Hint</span>
<div class="lite-page-tooltip__content lite-page-tooltip__content--above">
<div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as
their ResearchGate login</div>
<div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
<div class="lite-page-tooltip__arrow-tip"></div>
</div>
</div>
</div></span></label><input type="email" required="" id="input-modal-login" name="login" autocomplete="email" tabindex="1" placeholder="Enter your email"
class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default"></div>
<div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
<div class="lite-page-modal__forgot"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label"
for="input-modal-password-label"><span
class="nova-legacy-e-label__text">Password</span></label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page-modal__forgot-link" href="application.LostPassword.html">Forgot password?</a>
</div><input type="password" required="" id="input-modal-password" name="password" autocomplete="current-password" tabindex="2" placeholder=""
class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
</div>
<div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
<div><label class="nova-legacy-e-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" checked="" value="yes" name="setLoginCookie" tabindex="3"><span class="nova-legacy-e-checkbox__checkmark"></span><span
class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
</div>
<div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><button
class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
<div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
<div
class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
<div class="nova-legacy-l-flex__item">
<div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
</div>
<div class="nova-legacy-l-flex__item">
<div
class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
<div class="nova-legacy-l-flex__item">
<a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
</div>
</div>
</div>
<div class="nova-legacy-l-flex__item">
<div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500 lite-page-center">No account?
<a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-decorated" href="signup.SignUp.html?hdrsu=1&_sg%5B0%5D=WoMD_Lsue-kbW67NnMAvTZ1DTdztOQpLWF-dfoWoBG7b6UtoiOtGj_PBJXgEZ5nvv4qtMrnDvVSXraiP8faC1ASFv4Y">Sign up</a>
</div>
</div>
</div>
</div>
</div>
</form>
Text Content
WE VALUE YOUR PRIVACY We and our partners store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products.With your permission we and our partners may use precise geolocation data and identification through device scanning. You may click to consent to our and our partners’ processing as described above. Alternatively you may click to refuse to consent or access more detailed information and change your preferences before consenting.Please note that some processing of your personal data may not require your consent, but you have a right to object to such processing. Your preferences will apply to a group of websites. You can change your preferences at any time by returning to this site or visit our privacy policy. AGREE DISAGREE MORE OPTIONS ArticlePDF Available PROTOTYPE OF INTRUSION DETECTION MODEL USING UML 5.0 AND FORWARD ENGINEERING * January 2011 * Informatica Economica 15(2):29-37 * Source * RePEc Authors: Muthaiyan Madiajagan * SME Business Pragya GARG Pragya GARG * This person is not on ResearchGate, or hasn't claimed this research yet. Download full-text PDFRead full-text Download full-text PDF Read full-text Download citation Copy link Link copied Read full-text Download citation Copy link Link copied Citations (1) References (11) Figures (6) ABSTRACT AND FIGURES In this paper we are using UML (Unified Modeling Language) which is the blueprint language between the programmers, analysts, and designer’s for easy representation of pictures or diagrammatic notation with some textual data. Here we are using UML 5.0 to show “prototype of the Intrusion Detection Model†and by explaining it by combining various parts by drawing various UML diagrams such as Use cases and Activity diagrams and Class Diagram using which we show forward engineering using the class diagram of the IDM( Intrusion Detection Model). IDM is a device or software that works on detecting malicious activities by unauthorized users that can cause breach to the security policy within a network. Prototype of the IDM [1] … Use-Case diagram drawn between Business Rules Engine, Alert Agent, Verifier and Manual Intervention using UML 5.0 … Activity Diagram between the Business Rules Engine, Manual Intervention, Alert Agent and Verifier using UML 5.0 … Activity Diagram between Database, Updater and Verifier using UML 5.0 … +1 Use-Case diagram of components and actors involved are the Cache memory, Sampler, Business Rules Engine, Network Packet Analyzer and the Pre-processing Engine using UML 5.0 … Figures - uploaded by Muthaiyan Madiajagan Author content All figure content in this area was uploaded by Muthaiyan Madiajagan Content may be subject to copyright. Discover the world's research * 20+ million members * 135+ million publications * 700k+ research projects Join for free Public Full-text 1 Content uploaded by Muthaiyan Madiajagan Author content All content in this area was uploaded by Muthaiyan Madiajagan on Sep 19, 2015 Content may be subject to copyright. Informatica Economică vol. 15, no. 2/2011 29 Prototype of Intrusion Detection Model using UML 5.0 and Forward Engineering Muthaiyan MADIAJAGAN, Pragya GARG Birla Institute of Technology Pilani, Dubai Campus, Dubai, UAE jagan@bitsdubai.com, prag.garg@gmail.com In this paper we are using UML (Unified Modeling Language) which is the blueprint language between the programmers, analysts, and designer’s for easy representation of pictures or diagrammatic notation with some textual data. Here we are using UML 5.0 to show “prototype of the Intrusion Detection Model” and by explaining it by combining various parts by drawing various UML diagrams such as Use cases and Activity diagrams and Class Diagram using which we show forward engineering using the class diagram of the IDM( Intrusion Detection Model). IDM is a device or software that works on detecting malicious activities by unauthorized users that can cause breach to the security policy within a network. Keywords: Intrusion, Anomaly, UML, Forward Engineering, Intrusion Detection Introduction Intrusion is the breach of security policy of a system or a network by unauthorized personals. Protection of this vital information from malicious activities of the Hackers in the era of networking has become an important issue. Suspicious activities by these attackers can be identified either by user’s behavior or by user profiling by using user models. Intrusion detection is used to trace malicious activities by these attackers. Most of these activities take place at the host machine. Maximum number of such anomalies is carried out from a host machine and they sometimes remain undetected by few network based intrusion systems. IDS monitor the network by finding signs such as that of thwart or intrusion and produce report to Management Station [4]. The World Wide Web is becoming a vast resource of information as attackers can now strategically work on much more sophisticated attacks with the growing access to the internet. With time and experience they use their unpredictable methods for attacking, making it hard for the agent to learn its approach. Each time the attacker comes with more concrete solution and a better approach for attacking the system. They are advancing in learning the changes and limitations of the operating systems, network protocols and the software implementations of various kinds. In defense to such attacks host based solutions like IDS, antivirus software, fire walls etc. are commonly used. Host based solutions like Intrusion Detection System, various antivirus software and firewalls are usually used for anomaly types such as virus or intrusion detection. Although, these approaches are not fully accurate, they also have limitations. Thus, there arises a need to develop newer systems to overcome the ever growing network intrusion threats. Our main focus of this paper will be to explain how an intrusion detection model works, how packets’ are passing, what kind of components is making the system, how information flow occurs by the help of UML. Using UML we will explain the IDM and later will present a java code for translation of design artifacts to a foundation of a code which will show a translation from design artifacts to a foundation of a code, which is not meant to illustrate a robust, fully developed Java program with synchronization, exception handling and so on, but only for the better understanding of the diagram [3]. We have also extended by giving the UML diagrams and the Forward Engineering using java code for various classes later in this paper [1]. The Prototype is shown in the following Figure1. 1 30 Informatica Economică vol. 15, no. 2/2011 Fig. 1. Prototype of the IDM [1] 2 UML (Unified Modeling Language) In the field of software engineering UML is a general purpose modeling language. It can be used as a visual language for specification, documentation and construction of the artifacts of the systems. The UML represents diagrammatic notation or pictures with some textual data. UML is considered a software blueprint language for analysts, designers, and programmers.UML is used for object-oriented problem solving [12]. TYPES OF UML’s There are nine types of UML diagrams which lead to simplification of the problem such as Use-cases, Class, Object, Sequence, Collaboration, State chart, Activity, Component and the Deployment diagrams. Figure 2 shows a Use- Case UML diagram drawn in UML 5.0 version. It shows a standpoint of an external user. It emphasis more on what a system does rather than how it is done. Use-Cases are connected to scenarios. A scenario is an example of what happens when someone interacts with the system. It is showing a Use-Case relationship between Business Rules Engine, Alert Agent, Verifier and Manual Intervention. Here the Business Rules Engine will check the XML packets. It responds to the DOS attacks, Filtering, Screening and Authentication. If at all any errors are encountered then Alerts will be audited, Logged and mailed to concerned authorities along with the Alert Agent Component. If at all any anomaly is detected Business Rules Engine sends it to Manual Intervention Component as well. Administrator will manually check for errors and correct then if sent to Manual Intervention Component. For further Analysis of the XML packet Manual Intervention Component will further send it to the Verifier. The following figure is showing a Use-Case relationship between Business Rules Engine, Alert Agent, Verifier and Manual Intervention. Here the Business Rules Engine checks the XML packets. It will respond to the DOS attacks, Filtering, Screening and Authentication. If at all any errors are encountered then Alerts will be audited, Logged and mailed to concerned authorities along with the Alert Agent Component. If at all any anomaly is detected Business Rules Engine sends it to Manual Intervention Component as well. Administrator will manually check for errors and correct then if sent to Manual Intervention Component. For further Analysis of the XML packet Manual Intervention Component will further send it Informatica Economică vol. 15, no. 2/2011 31 to the Verifier. Fig. 2. Use-Case diagram drawn between Business Rules Engine, Alert Agent, Verifier and Manual Intervention using UML 5.0 Figure 3 represents the same components i.e. the Business Rules Engine, Manual Intervention, Alert Agent and Verifier in UML 5.0 using Activity Diagram. Activity diagram focuses on the flow of activities involved in a single process. The Activity Diagrams shows how these activities depend upon one another. Activity Diagrams can be divided into object swim-lanes which will determine which object is responsible for which activity. A single transition will come out of each activity connecting it to the next activity. A transition branches into two or more mutually exclusive transitions. Guard Expressions (inside []) label the transitions coming out of a branch. A transition may fork into two or more parallel activities, which combine later in the form of solid bars. The diagram begins with a start circle at the beginning and ends with concentric black/white stop circles towards the end. The activities are rounded circles. In this figure the diagram starts with a black circle marking the beginning of the activity diagram. As soon as the anomaly is detected, for each error is either sent to the Alert Agent Component or the Manual Intervention. If sent to the Alert Agent Component then the Alerts are audited, logged and is mailed to the concerned Authorities. If sent to the Manual Intervention component if it succeeds then it goes to the manually 32 Informatica Economică vol. 15, no. 2/2011 addressing to the administrator of the location. Upon failure will go for further analysis to the verifier. In order to check for known attack signatures send the documents to the verifier, this activation diagram ends with concentric black/white stop circles towards the end. Fig. 3. Activity Diagram between the Business Rules Engine, Manual Intervention, Alert Agent and Verifier using UML 5.0 Figure 4 is showing an Activity Diagram of Database, Updater and Verifier. Here the activation diagram begins with a start circle at the beginning. Local Database is used. Database is used to send web services based notices to all instances. Updater receives all the web services updates and keep updating, changing, upgrading the database with new information. Using Hash Algorithm picked up XML packet with given payload are digested. The verifier checks all the packets against attacks. Finally attack is prevented and activity diagram ends with concentric black/white stop circles towards the end. Informatica Economică vol. 15, no. 2/2011 33 Fig. 4. Activity Diagram between Database, Updater and Verifier using UML 5.0 Figure 5 shows a Use-Case diagram of components and actors involved are the Cache memory, Sampler, Business Rules Engine, Network Packet Analyzer and the Pre-processing Engine. Here Cache Memory collects network packets. It can either be a cache hit/cache miss. Sampler will heuristically pick up sample network packets, and send them to the Network Packet Analyzer. Network Packet Analyzer and Pre-Processing Engine will analyze the packets and convert them into XML documents. They will go to the Business Rules Engine which will check XML documents for anomalies, detects un- trusted IP’ s, detects screening, Dos attacks, filtering and screening. 34 Informatica Economică vol. 15, no. 2/2011 Fig. 5. Use-Case diagram of components and actors involved are the Cache memory, Sampler, Business Rules Engine, Network Packet Analyzer and the Pre-processing Engine using UML 5.0 Figure 6 shows a class diagram covering all components like the Sampler, Alert Agent, Database, Verifier, Updater, Manual Intervention and the Business Rules Engine. A class diagram is used to give the overview of a system with its classes. Class diagrams are static-they are only used for displaying what interacts, how the components interact is not shown. UML Class diagram consists of a class name, attributes, and the operations. Class diagrams have three kinds of relationships: Association-It is a relationship in between instances of two classes. Aggregation-It shows the collection of an entire class. It is shown by a diamond end pointing to the part containing the whole and Generalization-It shows the class-super class relationship. Class diagrams can show various multiplicities such as 0...1(zero or one instance), 0...* or *(either none, or no limit on the number of instances), 1(exactly one instance), 1...*(at least one instance) [4]. Informatica Economică vol. 15, no. 2/2011 35 Fig. 6. Class –Diagram using UML 5.0 3 Java coding This section will present a domain layer of the classes in Java for this Iteration. The main point here is that there is a translation from design artifacts i.e. from a UML class diagram drawn in UML 5.0 version to a foundation of code. This code is not meant to illustrate a fully developed, robust Java Program with synchronization and exception handling [3]. Figure 6 represents a Java Program for IDM Prototype. Class Updater Public class updater { Private Packet info1; Public Updater (Packet changeoccured) {info1 = changeoccured ;} public Packet getinfo1 () {return info1; } } Class Business Rules Engine Public class Business Rules Engine { private Map<ItemRules, ManualIntervention> Interventions = new HashMap()<ItemRules, ManualIntervention>; public Business Rules Engine() { ItemRules ir1 = new ItemRules( 100 ); ItemRules ir2 = new ItemRules( 200 ); Rules set = new Rules( 30 ); Manual Intervention Inter; Inter = new Manual Intervention( ir1, set, "packet 1" ); interventions.put( ir1, inter); inter = new ManualIntervention ( ir2, set, "packet 2" ); interventions.put( ir2, inter); 36 Informatica Economică vol. 15, no. 2/2011 } Public Manual Intervention get Manual Intervention( Item rules ir) { returninterventions.get( ir ); } } Class Alert Agent public class Alert Agent { privateBuisness Rules Engine Engine; public Alert Agent( Business Rules Engine Engine ); { this.Engine = Engine; } public void checkAlerts() { currentAlerts.becomeComplete(); } public void getAudited( Item rules ir, int number ); { Manual intervention inter = Engine.getManualIntervention(ir ); } public void get logged() { current log = new log(); } public void getUpdate ( changeoccured ); } } Class Manual Intervention public class Manual Intervention { private Item ir; private Rules set; private string intervention; public Manual Intervention (ItemRulesir, Rules set, string intervention ) } publicItemIRgetItem() { return ir; } public Rules getRules() { return rules; } public string getIntervention() { return intervention; } Class Database public Class Database { private List<VerifierAudits> Audits = newArrayList()<VerifierAudits> ; private Number number = new number(); privatebooleam is complete = false; private Updater updater; public packet getUpdated() { return updated.getInfo1(). minus(getData() ); } public void become complete () { isComplete = true; } public void makeAudits ( ManualIntervention Inter, int number) { Audits.add( new verifier Audits( inter, number)); public packet getData() { Packet data = new Packets(); Packet subdata = null; for( Verifier Audits Audits = Audits ) { subdata = Audits.get subdata(); Data.add( subdata ); } return data; } public void make update( Packet changeoccured) { update = new update( changeoccured ); } } Class Verifier Audits public class verifier Audits { privateint number; private Manual Intervention intervention; public verifier( Manual Intervention Inter, int number ) { this.intervention = inter; this.number = number; } public packet get subdata() { returnIntervention.get value().times( mumber ); } } Class Sampler Public class Sampler { privateBuisness Rules Engine Engine = new Buisness Rules Engine Engine(); private Alert Agent alert agent = new Alert Agent( Engine ); public Alert Agent get Alert Agent() {return alert agent; } Informatica Economică vol. 15, no. 2/2011 37 4 Conclusion The proposed architecture will manage the distributed system components efficiently. It will allow new computing resources and services to be added dynamically. Most of the challenges faced by current IDS are addressed by the proposed architecture. We have successfully explained and simplified the Prototype of the IDM using blueprint language UML, version 5.0. We have combined various components and actors for various for Class, Activity and Use-Case diagrams. We have also shown Forward Engineering with the help of Class diagram using java code. Future Work Reading specifications from a file and drawing the diagram using program. Create a UML diagram through a program in JAVA/VB i.e. Reverse Engineering which is totally opposite of what we have done in this paper. We aim at getting UML diagrams directly from Java or some other language with different diagrams apart from class diagrams like sequence diagrams. References [1] International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009. [2] International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009. [3] C. Larman, An Introduction to object- Oriented Analysis and Design and Iterative Development. [4] S. R. Pressman, Software Engineering, A Practioner’ s Approach. [5] P. China and Huangshan, “Proceedings of the Second Symposium International computer Science and Computational Technology (ISCSCT’ 09)” 26-28, Dec. 2009, pp. 134-138. [6] M. Chapple and E. Tittle, Certified information systems security professional. [7] International Journal of Recent Trends in Engineering, Vol. 2, No. 2, November 2009 (Nanyang Technology University), RESEARCH PAPER. [8] International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May 2009, RESEARCH PAPER. [9] http://technet.microsoft.com/en- us/library/cc751219.aspx (via. Google.com) [10] A. Schwartzbard, A.K. Ghosh, A study in the Feasibility of Performing Host-based Anomaly Detection on Windows NT. [11] M. Speciner, C. Kaufman and R. Pearlman, “Network Security”. [12] Ontology for Host-based Anomaly Detection-Margareth P. Adaa (Oslo University College) May 23, 2007. [13] R. King and G. Govanus “Windows 2000 Network Security Design”. Madiajagan MUTHAIYAN holds a M.S., in Software Systems from BITS, Pilani, India and a PhD in Component based software Development. He has 15 years of College / University teaching experience and 2 years of experience in Blue Chip Software Company. Presently, he is working as Senior Lecturer, CS, BITS, Pilani-Dubai. His areas of interest include Component Based Software Engineering, Distributed Database Systems, Software Architecture, and Theory of Computation. He is a Professional member of Professional bodies ACM, World Enformatica Society and Computer Society of India. Pragya GARG is presently a final year student in B.E Computer Science. She has experience in IT section and is currently working at GBM (IBM) in Dubai as a Software Sales Trainee in the year 2011. She has Technical skills in C, Java, JavaScript, PHP, HTML, SQL and UML. CITATIONS (1) REFERENCES (11) ... UML models enhance communication among analysts, designers, developers, testers and domain experts in their understanding of the process of designing and developing software. UML is an aggregation of different diagram types, such as Functional diagram, Structural diagrams, Interaction diagrams, and Behavioural diagrams (e.g., State diagrams, Activity diagrams, etc.) used for different purposes [9,10,11]. It is a language of communication between programmers, analysts, and designers as they represent their ideas, models, etc., in pictures or diagrams with some textual data. ... ... For example various UML diagrams like the use-case diagram, activity diagram, class diagram, etc., were used to portray the prototype intrusion detection system reported in [9]. ... Unified Modelling Language–Adaptive Neuro-Fuzzy Inference System Models for Understanding the Design Complexity of Oil/Gas Pipeline Intrusion Detection System Article Full-text available * Feb 2018 * Francis Imouokhome * E Onibere View Software Engineering: a Practioner''s approach Article * Jan 1987 * R.S. Pressman View Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development Chapter * Jan 2004 * Craig Larman View A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Conference Paper * Jan 1999 * Aaron Schwartzbard * Anup K. Ghosh View Certified information systems security professional * M Chapple * E Tittle M. Chapple and E. Tittle, Certified information systems security professional. She has experience in IT section and is currently working at GBM (IBM) in Dubai as a Software Sales Trainee in the year 2011. She has Technical skills in C * Garg Pragya Pragya GARG is presently a final year student in B.E Computer Science. She has experience in IT section and is currently working at GBM (IBM) in Dubai as a Software Sales Trainee in the year 2011. She has Technical skills in C, Java, JavaScript, PHP, HTML, SQL and UML. * Dec 2009 * Research Paper International Journal of Recent Trends in Engineering, Vol. 2, No. 2, November 2009 (Nanyang Technology University), RESEARCH PAPER. * Jan 2000 * R King * G Govanus R. King and G. Govanus " Windows 2000 Network Security Design ". * Apr 2009 * Research Paper International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May 2009, RESEARCH PAPER. Windows 2000 Network Security Design * R King * G Govanus R. King and G. Govanus "Windows 2000 Network Security Design". Pragya GARG is presently a final year student in B.E Computer Science. She has experience in IT section and is currently working at GBM (IBM) in Dubai as a Software Sales Trainee in the year 2011. She has Technical * C Java * Javascript * Php * Html Pragya GARG is presently a final year student in B.E Computer Science. She has experience in IT section and is currently working at GBM (IBM) in Dubai as a Software Sales Trainee in the year 2011. She has Technical skills in C, Java, JavaScript, PHP, HTML, SQL and UML. Show more Advertisement RECOMMENDATIONS Discover more Project BRAIN COMPUTING * Muthaiyan Madiajagan Designing a Neuro-cap that help the neuro spleaclist View project Project TRANSMISSION POWER AND FREQUENCY BASED NETWORK SELECTION SCHEME FOR MINIMIZING THE HARMFUL RADIATION * Muthaiyan Madiajagan View project Project INFORMATION LOCKER SYSTEM FOR ANDROID MOBILE USERS USING STEGANOGRAPHY TECHNIQUE * Muthaiyan Madiajagan View project Project SMART SCHOOL BAG FOR ASSISTING AND PROTECTING THE SCHOOL STUDENTS BY TRACKING THE GEOGRAPHICAL LOCATION * Muthaiyan Madiajagan View project Article USB/IP : UNIVERSAL SERIAL BUS EXTENSION OVER IP NETWORK * Takahiro Hirofuchi http://library.naist.jp/mylimedio/dllimedio/show.cgi?bookid=98489 博士 (Doctor) 工学 (Engineering) 博第643号 甲第643号 Read more Article ISSUES IN TEMPORAL REPRESENTATION OF MULTIMEDIA DOCUMENTS October 1996 * Nabil Layada this paper some important issues for temporal representation and synchronization of multimedia documents. We have designed an experimental tool that manages temporal information internally as an extended temporal constraint network [11]. The document representation used in MADEUS is mainly based on descriptive markup of media items and Allen's like temporal operators. We think that it is powerful ... [Show full abstract] enough and suitable for both multimedia authoring and presentation. Among the characteristics of the MADEUS prototype, we gave a particular attention to the following aspects: Read more Conference Paper Full-text available ENVISIONING COMMUNICATION: TASK-TAILORABLE REPRESENTATIONS OF COMMUNICATION IN ASYNCHRONOUS WORK. January 1998 * Christine M. Neuwirth * James Morris * Susan Harkness Regli * [...] * Geoffrey C. Wenger This paper reports on our efforts to improve interfaces for asynchronous communication in which a group is communicating to solve a problem. We report results from an observational study and an experiment and use them as a basis for drawing design requirements: task-tailorable representations, emergent representations, emergent sharing, public/private elements in a layout, incremental ... [Show full abstract] formalization, and asynchronous awareness. We describe an approach and prototype that embodies some of the key requirements. View full-text Conference Paper NODE CONVERSION IN HYPERMEDIA SYSTEMS January 1992 * Anamika Saxena * Su Hee Kim * Caroline M. Eastman In a hypermedia system information is stored in a network of nodes, connected by links. Each node can be presented using one or more media formats. The problem of automatically converting a node from one media format to another is considered. This capability would allow users to select the most convenient representation for a particular application. A number of possible conversions are presented, ... [Show full abstract] and some of the design issues involved in automatic node conversion are discussed. A prototype system has been implemented, and future research is planned. Read more Discover the world's research Join ResearchGate to find the people and research you need to help your work. Join for free ResearchGate iOS App Get it from the App Store now. Install Keep up with your stats and more Access scientific knowledge from anywhere or Discover by subject area * Recruit researchers * Join for free * Login Email Tip: Most researchers use their institutional email address as their ResearchGate login PasswordForgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login PasswordForgot password? Keep me logged in Log in or Continue with Google No account? Sign up Company About us News Careers Support Help Center Business solutions Advertising Recruiting © 2008-2022 ResearchGate GmbH. All rights reserved. * Terms * Privacy * Copyright * Imprint