www.researchgate.net Open in urlscan Pro
2606:4700::6811:2069  Public Scan

URL: https://www.researchgate.net/publication/227363827_Prototype_of_Intrusion_Detection_Model_using_UML_50_and_Forward_Engineering
Submission: On June 02 via api from ZW — Scanned from DE

Form analysis 3 forms found in the DOM

GET search

<form method="GET" action="search" class="lite-page__header-search-input-wrapper"><input type="hidden" name="context" readonly="" value="publicSearchHeader"><input placeholder="Search for publications, researchers, or questions" name="q"
    autocomplete="off" class="lite-page__header-search-input"><button
    class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-green nova-legacy-c-button--theme-bare nova-legacy-c-button--width-square lite-page__header-search-button"
    type="submit"><span class="nova-legacy-c-button__label"><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
        <use xlink:href="/m/4210735495654424/images/icons/nova/icon-stack-s.svg#magnifier-s"></use>
      </svg></span></button></form>

Name: loginFormPOST https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g

<form method="post" action="https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g" name="loginForm" id="headerLoginForm"><input type="hidden" name="request_token"
    value="aad-Qihhlk47A323CWE4KYXGrITZmDe0bgrgJ49I4hGg1BNcox9CRNt57khiB3HQtBxos5W9tANpoZOblR44mJzEE/sL2mybRaZp5jkEGOG67WtsvkW/x67Ja3WrqG2NEuoylo1WQytrONnKwZB8i0VWZpO1LMMijGtpL1fMgITIVQkMEbtoe4LXqmfmJYIzQZbQJQ38BE7ZydPlF1WF5ooW0+QKFtzzVBD8+EhbnMR8QSN/D/6p4Q3iv2KkG5a69J+k3JuXggVoowFswADpgfE="><input
    type="hidden" name="urlAfterLogin" value="publication/227363827_Prototype_of_Intrusion_Detection_Model_using_UML_50_and_Forward_Engineering"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden" name="headerLogin"
    value="yes">
  <div class="lite-page__header-login-item"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit lite-page__header-login-label"
      for="input-header-login">Email <div class="lite-page-tooltip "><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
          <use xlink:href="/m/4210735495654424/images/icons/nova/icon-stack-s.svg#info-circle-s"></use>
        </svg>
        <div class="lite-page-tooltip__content lite-page-tooltip__content--above">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as their
            ResearchGate login</div>
          <div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
            <div class="lite-page-tooltip__arrow-tip"></div>
          </div>
        </div>
      </div></label></div><input type="email" required="" id="input-header-login" name="login" autocomplete="email" tabindex="1" placeholder=""
    class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
  <div class="lite-page__header-login-item"><label class="lite-page__header-login-label"
      for="input-header-password">Password</label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page__header-login-forgot" href="application.LostPassword.html">Forgot password?</a></div><input
    type="password" required="" id="input-header-password" name="password" autocomplete="current-password" tabindex="2" placeholder=""
    class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
  <div><label class="nova-legacy-e-checkbox lite-page__header-login-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" name="setLoginCookie" tabindex="3" value="yes" checked=""><span
        class="nova-legacy-e-checkbox__checkmark"></span><span class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
  <div
    class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-stretch@s-up nova-legacy-l-flex--justify-content-center@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
    <div class="nova-legacy-l-flex__item"><button
        class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
        tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
    <div class="nova-legacy-l-flex__item nova-legacy-l-flex__item--align-self-center@s-up">
      <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
    </div>
    <div class="nova-legacy-l-flex__item">
      <div
        class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
        <div class="nova-legacy-l-flex__item">
          <a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
        </div>
      </div>
    </div>
  </div>
</form>

Name: loginFormPOST https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g

<form method="post" action="https://www.researchgate.net/login?_sg=HY83xv5DLoL8kS_eJPFk2F7Q0bs7lMUwk8kelAGcVQKhs5Fq6sVRImkDvKwyHhP4QQPBmBTYPZ397g" name="loginForm" id="modalLoginForm"><input type="hidden" name="request_token"
    value="aad-Qihhlk47A323CWE4KYXGrITZmDe0bgrgJ49I4hGg1BNcox9CRNt57khiB3HQtBxos5W9tANpoZOblR44mJzEE/sL2mybRaZp5jkEGOG67WtsvkW/x67Ja3WrqG2NEuoylo1WQytrONnKwZB8i0VWZpO1LMMijGtpL1fMgITIVQkMEbtoe4LXqmfmJYIzQZbQJQ38BE7ZydPlF1WF5ooW0+QKFtzzVBD8+EhbnMR8QSN/D/6p4Q3iv2KkG5a69J+k3JuXggVoowFswADpgfE="><input
    type="hidden" name="urlAfterLogin" value="publication/227363827_Prototype_of_Intrusion_Detection_Model_using_UML_50_and_Forward_Engineering"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden" name="modalLogin"
    value="yes">
  <div class="nova-legacy-l-form-group nova-legacy-l-form-group--layout-stack nova-legacy-l-form-group--gutter-s">
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><label
        class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label" for="input-modal-login-label"><span
          class="nova-legacy-e-label__text">Email <div class="lite-page-tooltip "><span class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500">·
              Hint</span>
            <div class="lite-page-tooltip__content lite-page-tooltip__content--above">
              <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as
                their ResearchGate login</div>
              <div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
                <div class="lite-page-tooltip__arrow-tip"></div>
              </div>
            </div>
          </div></span></label><input type="email" required="" id="input-modal-login" name="login" autocomplete="email" tabindex="1" placeholder="Enter your email"
        class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default"></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div class="lite-page-modal__forgot"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label"
          for="input-modal-password-label"><span
            class="nova-legacy-e-label__text">Password</span></label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page-modal__forgot-link" href="application.LostPassword.html">Forgot password?</a>
      </div><input type="password" required="" id="input-modal-password" name="password" autocomplete="current-password" tabindex="2" placeholder=""
        class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
    </div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div><label class="nova-legacy-e-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" checked="" value="yes" name="setLoginCookie" tabindex="3"><span class="nova-legacy-e-checkbox__checkmark"></span><span
            class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
    </div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><button
        class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
        tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div
        class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
        <div class="nova-legacy-l-flex__item">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
        </div>
        <div class="nova-legacy-l-flex__item">
          <div
            class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
            <div class="nova-legacy-l-flex__item">
              <a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
            </div>
          </div>
        </div>
        <div class="nova-legacy-l-flex__item">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500 lite-page-center">No account?
            <a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-decorated" href="signup.SignUp.html?hdrsu=1&amp;_sg%5B0%5D=WoMD_Lsue-kbW67NnMAvTZ1DTdztOQpLWF-dfoWoBG7b6UtoiOtGj_PBJXgEZ5nvv4qtMrnDvVSXraiP8faC1ASFv4Y">Sign up</a>
          </div>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting.Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to a group of websites. You can change your preferences
at any time by returning to this site or visit our privacy policy.
AGREE DISAGREE MORE OPTIONS
ArticlePDF Available


PROTOTYPE OF INTRUSION DETECTION MODEL USING UML 5.0 AND FORWARD ENGINEERING

 * January 2011
 * Informatica Economica 15(2):29-37

 * Source
 * RePEc

Authors:
Muthaiyan Madiajagan
 * SME Business



Pragya GARG


Pragya GARG
 * This person is not on ResearchGate, or hasn't claimed this research yet.



Download full-text PDFRead full-text
Download full-text PDF
Read full-text
Download citation
Copy link Link copied
Read full-text
Download citation
Copy link Link copied
Citations (1)
References (11)
Figures (6)





ABSTRACT AND FIGURES

In this paper we are using UML (Unified Modeling Language) which is the
blueprint language between the programmers, analysts, and designer’s for easy
representation of pictures or diagrammatic notation with some textual data. Here
we are using UML 5.0 to show “prototype of the Intrusion Detection Model†and
by explaining it by combining various parts by drawing various UML diagrams such
as Use cases and Activity diagrams and Class Diagram using which we show forward
engineering using the class diagram of the IDM( Intrusion Detection Model). IDM
is a device or software that works on detecting malicious activities by
unauthorized users that can cause breach to the security policy within a
network.
Prototype of the IDM [1]
… 
Use-Case diagram drawn between Business Rules Engine, Alert Agent, Verifier and
Manual Intervention using UML 5.0
… 
Activity Diagram between the Business Rules Engine, Manual Intervention, Alert
Agent and Verifier using UML 5.0
… 
Activity Diagram between Database, Updater and Verifier using UML 5.0
… 
+1
Use-Case diagram of components and actors involved are the Cache memory,
Sampler, Business Rules Engine, Network Packet Analyzer and the Pre-processing
Engine using UML 5.0
… 
Figures - uploaded by Muthaiyan Madiajagan
Author content
All figure content in this area was uploaded by Muthaiyan Madiajagan

Content may be subject to copyright.

Discover the world's research

 * 20+ million members
 * 135+ million publications
 * 700k+ research projects

Join for free

Public Full-text 1



Content uploaded by Muthaiyan Madiajagan
Author content

All content in this area was uploaded by Muthaiyan Madiajagan on Sep 19, 2015
Content may be subject to copyright.
Informatica Economică vol. 15, no. 2/2011 29

Prototype of Intrusion Detection Model using UML 5.0 and
Forward Engineering

Muthaiyan MADIAJAGAN, Pragya GARG
Birla Institute of Technology Pilani, Dubai Campus, Dubai, UAE
jagan@bitsdubai.com, prag.garg@gmail.com

In this paper we are using UML (Unified Modeling Language) which is the
blueprint
language between the programmers, analysts, and designer’s for easy
representation of
pictures or diagrammatic notation with some textual data. Here we are using UML
5.0 to
show “prototype of the Intrusion Detection Model” and by explaining it by
combining various
parts by drawing various UML diagrams such as Use cases and Activity diagrams
and Class
Diagram using which we show forward engineering using the class diagram of the
IDM(
Intrusion Detection Model). IDM is a device or software that works on detecting
malicious
activities by unauthorized users that can cause breach to the security policy
within a network.
Keywords: Intrusion, Anomaly, UML, Forward Engineering, Intrusion Detection
Introduction
Intrusion is the breach of security policy
of a system or a network by unauthorized
personals. Protection of this vital information
from malicious activities of the Hackers in
the era of networking has become an
important issue. Suspicious activities by
these attackers can be identified either by
user’s behavior or by user profiling by using
user models. Intrusion detection is used to
trace malicious activities by these attackers.
Most of these activities take place at the host
machine. Maximum number of such
anomalies is carried out from a host machine
and they sometimes remain undetected by
few network based intrusion systems.
IDS monitor the network by finding signs
such as that of thwart or intrusion and
produce report to Management Station [4].
The World Wide Web is becoming a vast
resource of information as attackers can now
strategically work on much more
sophisticated attacks with the growing access
to the internet. With time and experience they
use their unpredictable methods for
attacking, making it hard for the agent to
learn its approach. Each time the attacker
comes with more concrete solution and a
better approach for attacking the system.
They are advancing in learning the changes
and limitations of the operating systems,
network protocols and the software
implementations of various kinds. In defense
to such attacks host based solutions like IDS,
antivirus software, fire walls etc. are
commonly used.
Host based solutions like Intrusion Detection
System, various antivirus software and
firewalls are usually used for anomaly types
such as virus or intrusion detection.
Although, these approaches are not fully
accurate, they also have limitations. Thus,
there arises a need to develop newer systems
to overcome the ever growing network
intrusion threats.
Our main focus of this paper will be to
explain how an intrusion detection model
works, how packets’ are passing, what kind
of components is making the system, how
information flow occurs by the help of UML.
Using UML we will explain the IDM and
later will present a java code for translation
of design artifacts to a foundation of a code
which
will show a translation from design
artifacts to a foundation of a code, which is
not meant to illustrate a robust, fully
developed Java program with
synchronization, exception handling and so
on, but only for the better understanding of
the diagram [3]. We have also extended by
giving the UML diagrams and the Forward
Engineering using java code for various
classes later in this paper [1].
The Prototype is shown in the following
Figure1.
1



30 Informatica Economică vol. 15, no. 2/2011

Fig. 1. Prototype of the IDM [1]

2 UML (Unified Modeling Language)
In the field of software engineering UML is a
general purpose modeling language. It can
be used as a visual language for
specification, documentation and
construction of the artifacts of the systems.
The UML represents diagrammatic notation
or pictures with some textual data. UML is
considered a software blueprint language for
analysts, designers, and programmers.UML
is used for object-oriented problem solving
[12].
TYPES OF UML’s
There are nine types of UML diagrams which
lead to simplification of the problem such as
Use-cases, Class, Object, Sequence,
Collaboration, State chart, Activity,
Component and the Deployment diagrams.
Figure 2 shows a Use- Case UML diagram
drawn in UML 5.0 version. It shows a
standpoint of an external user. It emphasis
more on what a system does rather than how
it is done. Use-Cases are connected to
scenarios. A scenario is an example of what
happens when someone interacts with the
system. It is showing a Use-Case relationship
between Business Rules Engine, Alert Agent,
Verifier and Manual Intervention. Here the
Business Rules Engine will check the XML
packets. It responds to the DOS attacks,
Filtering, Screening and Authentication. If at
all any errors are encountered then Alerts
will be audited, Logged and mailed to
concerned authorities along with the Alert
Agent Component. If at all any anomaly is
detected Business Rules Engine sends it to
Manual Intervention Component as well.
Administrator will manually check for errors
and correct then if sent to Manual
Intervention Component. For further
Analysis of the XML packet Manual
Intervention Component will further send it
to the Verifier. The following figure is
showing a Use-Case relationship between
Business Rules Engine, Alert Agent, Verifier
and Manual Intervention. Here the Business
Rules Engine checks the XML packets. It
will respond to the DOS attacks, Filtering,
Screening and Authentication. If at all any
errors are encountered then Alerts will be
audited, Logged and mailed to concerned
authorities along with the Alert Agent
Component. If at all any anomaly is detected
Business Rules Engine sends it to Manual
Intervention Component as well.
Administrator will manually check for errors
and correct then if sent to Manual
Intervention Component. For further
Analysis of the XML packet Manual
Intervention Component will further send it


Informatica Economică vol. 15, no. 2/2011 31

to the Verifier.

Fig. 2. Use-Case diagram drawn between Business Rules Engine, Alert Agent,
Verifier and
Manual Intervention using UML 5.0

Figure 3 represents the same components i.e.
the Business Rules Engine, Manual
Intervention, Alert Agent and Verifier in
UML 5.0 using Activity Diagram. Activity
diagram focuses on the flow of activities
involved in a single process. The Activity
Diagrams shows how these activities depend
upon one another. Activity Diagrams can be
divided into object swim-lanes which will
determine which object is responsible for
which activity. A single transition will come
out of each activity connecting it to the next
activity. A transition branches into two or
more mutually exclusive transitions. Guard
Expressions (inside []) label the transitions
coming out of a branch. A transition may
fork into two or more parallel activities,
which combine later in the form of solid bars.
The diagram begins with a start circle at the
beginning and ends with concentric
black/white stop circles towards the end. The
activities are rounded circles. In this figure
the diagram starts with a black circle marking
the beginning of the activity diagram. As
soon as the anomaly is detected, for each
error is either sent to the Alert Agent
Component or the Manual Intervention. If
sent to the Alert Agent Component then the
Alerts are audited, logged and is mailed to
the concerned Authorities. If sent to the
Manual Intervention component if it
succeeds then it goes to the manually


32 Informatica Economică vol. 15, no. 2/2011

addressing to the administrator of the
location. Upon failure will go for further
analysis to the verifier. In order to check for
known attack signatures send the documents
to the verifier, this activation diagram ends
with concentric black/white stop circles
towards the end.

Fig. 3. Activity Diagram between the Business Rules Engine, Manual Intervention,
Alert
Agent and Verifier using UML 5.0

Figure 4 is showing an Activity Diagram of
Database, Updater and Verifier. Here the
activation diagram begins with a start circle
at the beginning. Local Database is used.
Database is used to send web services based
notices to all instances. Updater receives all
the web services updates and keep updating,
changing, upgrading the database with new
information. Using Hash Algorithm picked
up XML packet with given payload are
digested. The verifier checks all the packets
against attacks.
Finally attack is prevented and activity
diagram ends with concentric black/white
stop circles towards the end.



Informatica Economică vol. 15, no. 2/2011 33


Fig. 4. Activity Diagram between Database, Updater and Verifier using UML 5.0

Figure 5 shows a Use-Case diagram of
components and actors involved are the
Cache memory, Sampler, Business Rules
Engine, Network Packet Analyzer and the
Pre-processing Engine. Here Cache Memory
collects network packets.
It can either be a cache hit/cache miss.
Sampler will heuristically pick up sample
network packets, and send them to the
Network Packet Analyzer. Network Packet
Analyzer and Pre-Processing Engine will
analyze the packets and convert them into
XML documents. They will go to the
Business Rules Engine which will check
XML documents for anomalies, detects un-
trusted IP’ s, detects screening, Dos attacks,
filtering and screening.



34 Informatica Economică vol. 15, no. 2/2011


Fig. 5. Use-Case diagram of components and actors involved are the Cache memory,
Sampler, Business Rules Engine, Network Packet Analyzer and the Pre-processing
Engine
using UML 5.0

Figure 6 shows a class diagram covering all
components like the Sampler, Alert Agent,
Database, Verifier, Updater, Manual
Intervention and the Business Rules Engine.
A class diagram is used to give the overview
of a system with its classes. Class diagrams
are static-they are only used for displaying
what interacts, how the components interact
is not shown. UML Class diagram consists of
a class name, attributes, and the operations.
Class diagrams have three kinds of
relationships: Association-It is a relationship
in between instances of two classes.
Aggregation-It shows the collection of an
entire class. It is shown by a diamond end
pointing to the part containing the whole and
Generalization-It shows the class-super class
relationship. Class diagrams can show
various multiplicities such as 0...1(zero or
one instance), 0...* or *(either none, or no
limit on the number of instances), 1(exactly
one instance), 1...*(at least one instance) [4].



Informatica Economică vol. 15, no. 2/2011 35


Fig. 6. Class –Diagram using UML 5.0

3 Java coding
This section will present a domain layer of
the classes in Java for this Iteration. The
main point here is that there is a translation
from design artifacts i.e. from a UML class
diagram drawn in UML 5.0 version to a
foundation of code. This code is not meant to
illustrate a fully developed, robust Java
Program with synchronization and exception
handling [3].
Figure 6 represents a Java Program for IDM
Prototype.
Class Updater
Public class updater
{
Private Packet info1;
Public Updater (Packet
changeoccured) {info1 =
changeoccured ;}
public Packet getinfo1 () {return
info1; }
}

Class Business Rules Engine
Public class Business Rules Engine
{
private Map<ItemRules,
ManualIntervention>
Interventions = new
HashMap()<ItemRules,
ManualIntervention>;

public Business Rules Engine()
{
ItemRules ir1 = new ItemRules( 100
);
ItemRules ir2 = new ItemRules( 200
);
Rules set = new Rules( 30 );
Manual Intervention Inter;
Inter = new Manual
Intervention( ir1, set, "packet 1"
);
interventions.put( ir1, inter);
inter = new ManualIntervention (
ir2, set, "packet 2" );
interventions.put( ir2, inter);


36 Informatica Economică vol. 15, no. 2/2011

}
Public Manual Intervention get
Manual Intervention( Item rules ir)
{
returninterventions.get( ir );
}
}
Class Alert Agent
public class Alert Agent
{
privateBuisness Rules Engine Engine;
public Alert Agent( Business Rules
Engine Engine );
{
this.Engine = Engine;
}
public void checkAlerts()
{
currentAlerts.becomeComplete();
}
public void getAudited( Item rules
ir, int number );
{
Manual intervention inter =
Engine.getManualIntervention(ir );
}
public void get logged()
{
current log = new log();
}
public void getUpdate (
changeoccured );
}
}
Class Manual Intervention
public class Manual Intervention
{
private Item ir;
private Rules set;
private string intervention;
public Manual Intervention
(ItemRulesir, Rules set, string
intervention )
}
publicItemIRgetItem() { return ir; }
public Rules getRules() { return
rules; }
public string getIntervention() {
return intervention; }

Class Database
public Class Database
{
private List<VerifierAudits> Audits
= newArrayList()<VerifierAudits> ;
private Number number = new
number();
privatebooleam is complete = false;
private Updater updater;
public packet getUpdated()
{
return updated.getInfo1().
minus(getData() );
}
public void become complete () {
isComplete = true; }
public void makeAudits
( ManualIntervention Inter, int
number)
{
Audits.add( new verifier Audits(
inter, number));
public packet getData()
{ Packet data = new Packets();
Packet subdata = null;
for( Verifier Audits Audits = Audits
)
{
subdata = Audits.get subdata();
Data.add( subdata );
}
return data;
}
public void make update( Packet
changeoccured)
{
update = new update( changeoccured
);
}
}

Class Verifier Audits
public class verifier Audits
{
privateint number;
private Manual Intervention
intervention;
public verifier( Manual Intervention
Inter, int number )
{
this.intervention = inter;
this.number = number;
}
public packet get subdata()
{
returnIntervention.get
value().times( mumber );
}
}
Class Sampler
Public class Sampler
{
privateBuisness Rules Engine Engine
= new Buisness Rules Engine
Engine();
private Alert Agent alert agent =
new Alert Agent( Engine );
public Alert Agent get Alert Agent()
{return alert agent; }






Informatica Economică vol. 15, no. 2/2011 37

4 Conclusion
The proposed architecture will manage the
distributed system components efficiently. It
will allow new computing resources and
services to be added dynamically. Most of
the challenges faced by current IDS are
addressed by the proposed architecture. We
have successfully explained and simplified
the Prototype of the IDM using blueprint
language UML, version 5.0. We have
combined various components and actors for
various for Class, Activity and Use-Case
diagrams. We have also shown Forward
Engineering with the help of Class diagram
using java code.
Future Work
Reading specifications from a file and
drawing the diagram using program. Create a
UML diagram through a program in
JAVA/VB i.e. Reverse Engineering which is
totally opposite of what we have done in this
paper. We aim at getting UML diagrams
directly from Java or some other language
with different diagrams apart from class
diagrams like sequence diagrams.

References
[1] International Journal of Recent Trends in
Engineering, Vol. 1, No. 1, May 2009.
[2] International Journal of Recent Trends in
Engineering, Vol. 1, No. 2, May 2009.
[3] C. Larman, An Introduction to object-
Oriented Analysis and Design and
Iterative Development.
[4] S. R. Pressman, Software Engineering, A
Practioner’ s Approach.
[5] P. China and Huangshan, “Proceedings
of the Second Symposium International
computer Science and Computational
Technology (ISCSCT’ 09)” 26-28, Dec.
2009, pp. 134-138.
[6] M. Chapple and E. Tittle, Certified
information systems security
professional.
[7] International Journal of Recent Trends in
Engineering, Vol. 2, No. 2, November
2009 (Nanyang Technology University),
RESEARCH PAPER.
[8] International Journal of Recent Trends in
Engineering, Issue. 1, Vol. 1, May 2009,
RESEARCH PAPER.
[9] http://technet.microsoft.com/en-
us/library/cc751219.aspx (via.
Google.com)
[10] A. Schwartzbard, A.K. Ghosh, A study in
the Feasibility of Performing Host-based
Anomaly Detection on Windows NT.
[11] M. Speciner, C. Kaufman and R.
Pearlman, “Network Security”.
[12] Ontology for Host-based Anomaly
Detection-Margareth P. Adaa (Oslo
University College) May 23, 2007.
[13] R. King and G. Govanus “Windows
2000 Network Security Design”.

Madiajagan MUTHAIYAN holds a M.S., in Software Systems from BITS,
Pilani, India and a PhD in Component based software Development. He has
15 years of College / University teaching experience and 2 years of
experience in Blue Chip Software Company. Presently, he is working as
Senior Lecturer, CS, BITS, Pilani-Dubai. His areas of interest include
Component Based Software Engineering, Distributed Database Systems,
Software Architecture, and Theory of Computation. He is a Professional
member of Professional bodies ACM, World Enformatica Society and Computer
Society of
India.

Pragya GARG is presently a final year student in B.E Computer Science.
She has experience in IT section and is currently working at GBM (IBM) in
Dubai as a Software Sales Trainee in the year 2011. She has Technical skills
in C, Java, JavaScript, PHP, HTML, SQL and UML.





CITATIONS (1)


REFERENCES (11)




... UML models enhance communication among analysts, designers, developers,
testers and domain experts in their understanding of the process of designing
and developing software. UML is an aggregation of different diagram types, such
as Functional diagram, Structural diagrams, Interaction diagrams, and
Behavioural diagrams (e.g., State diagrams, Activity diagrams, etc.) used for
different purposes [9,10,11]. It is a language of communication between
programmers, analysts, and designers as they represent their ideas, models,
etc., in pictures or diagrams with some textual data. ...
... For example various UML diagrams like the use-case diagram, activity
diagram, class diagram, etc., were used to portray the prototype intrusion
detection system reported in [9]. ...

Unified Modelling Language–Adaptive Neuro-Fuzzy Inference System Models for
Understanding the Design Complexity of Oil/Gas Pipeline Intrusion Detection
System
Article
Full-text available
 * Feb 2018

 * Francis Imouokhome
 * E Onibere

View
Software Engineering: a Practioner''s approach
Article
 * Jan 1987

 * R.S. Pressman

View
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and
Design and Iterative Development
Chapter
 * Jan 2004

 * Craig Larman

View
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows
NT.
Conference Paper
 * Jan 1999

 * Aaron Schwartzbard
 * Anup K. Ghosh

View
Certified information systems security professional

 * M Chapple
 * E Tittle

M. Chapple and E. Tittle, Certified information systems security professional.

She has experience in IT section and is currently working at GBM (IBM) in Dubai
as a Software Sales Trainee in the year 2011. She has Technical skills in C

 * Garg Pragya

Pragya GARG is presently a final year student in B.E Computer Science. She has
experience in IT section and is currently working at GBM (IBM) in Dubai as a
Software Sales Trainee in the year 2011. She has Technical skills in C, Java,
JavaScript, PHP, HTML, SQL and UML.

 * Dec 2009

 * Research Paper

International Journal of Recent Trends in Engineering, Vol. 2, No. 2, November
2009 (Nanyang Technology University), RESEARCH PAPER.

 * Jan 2000

 * R King
 * G Govanus

R. King and G. Govanus " Windows 2000 Network Security Design ".

 * Apr 2009

 * Research Paper

International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May
2009, RESEARCH PAPER.

Windows 2000 Network Security Design

 * R King
 * G Govanus

R. King and G. Govanus "Windows 2000 Network Security Design".

Pragya GARG is presently a final year student in B.E Computer Science. She has
experience in IT section and is currently working at GBM (IBM) in Dubai as a
Software Sales Trainee in the year 2011. She has Technical

 * C Java
 * Javascript
 * Php
 * Html

Pragya GARG is presently a final year student in B.E Computer Science. She has
experience in IT section and is currently working at GBM (IBM) in Dubai as a
Software Sales Trainee in the year 2011. She has Technical skills in C, Java,
JavaScript, PHP, HTML, SQL and UML.

Show more

Advertisement



RECOMMENDATIONS

Discover more
Project


BRAIN COMPUTING

 * Muthaiyan Madiajagan

Designing a Neuro-cap that help the neuro spleaclist
View project
Project


TRANSMISSION POWER AND FREQUENCY BASED NETWORK SELECTION SCHEME FOR MINIMIZING
THE HARMFUL RADIATION

 * Muthaiyan Madiajagan

View project
Project


INFORMATION LOCKER SYSTEM FOR ANDROID MOBILE USERS USING STEGANOGRAPHY TECHNIQUE

 * Muthaiyan Madiajagan

View project
Project


SMART SCHOOL BAG FOR ASSISTING AND PROTECTING THE SCHOOL STUDENTS BY TRACKING
THE GEOGRAPHICAL LOCATION

 * Muthaiyan Madiajagan

View project
Article


USB/IP : UNIVERSAL SERIAL BUS EXTENSION OVER IP NETWORK


 * Takahiro Hirofuchi

http://library.naist.jp/mylimedio/dllimedio/show.cgi?bookid=98489 博士 (Doctor) 工学
(Engineering) 博第643号 甲第643号
Read more
Article


ISSUES IN TEMPORAL REPRESENTATION OF MULTIMEDIA DOCUMENTS

October 1996
 * Nabil Layada

this paper some important issues for temporal representation and synchronization
of multimedia documents. We have designed an experimental tool that manages
temporal information internally as an extended temporal constraint network [11].
The document representation used in MADEUS is mainly based on descriptive markup
of media items and Allen's like temporal operators. We think that it is powerful
... [Show full abstract] enough and suitable for both multimedia authoring and
presentation. Among the characteristics of the MADEUS prototype, we gave a
particular attention to the following aspects:
Read more
Conference Paper
Full-text available


ENVISIONING COMMUNICATION: TASK-TAILORABLE REPRESENTATIONS OF COMMUNICATION IN
ASYNCHRONOUS WORK.

January 1998
 * Christine M. Neuwirth
 * James Morris
 * Susan Harkness Regli
 * [...]
 * Geoffrey C. Wenger

This paper reports on our efforts to improve interfaces for asynchronous
communication in which a group is communicating to solve a problem. We report
results from an observational study and an experiment and use them as a basis
for drawing design requirements: task-tailorable representations, emergent
representations, emergent sharing, public/private elements in a layout,
incremental ... [Show full abstract] formalization, and asynchronous awareness.
We describe an approach and prototype that embodies some of the key
requirements.
View full-text
Conference Paper


NODE CONVERSION IN HYPERMEDIA SYSTEMS

January 1992
 * Anamika Saxena
 * Su Hee Kim
 * Caroline M. Eastman

In a hypermedia system information is stored in a network of nodes, connected by
links. Each node can be presented using one or more media formats. The problem
of automatically converting a node from one media format to another is
considered. This capability would allow users to select the most convenient
representation for a particular application. A number of possible conversions
are presented, ... [Show full abstract] and some of the design issues involved
in automatic node conversion are discussed. A prototype system has been
implemented, and future research is planned.
Read more

Discover the world's research
Join ResearchGate to find the people and research you need to help your work.
Join for free

ResearchGate iOS App
Get it from the App Store now.
Install
Keep up with your stats and more
Access scientific knowledge from anywhere

or
Discover by subject area
 * Recruit researchers
 * Join for free
 * Login
   Email
   Tip: Most researchers use their institutional email address as their
   ResearchGate login
   
   PasswordForgot password?
   Keep me logged in
   Log in
   or
   Continue with Google
   
   Welcome back! Please log in.
   Email
   · Hint
   Tip: Most researchers use their institutional email address as their
   ResearchGate login
   
   PasswordForgot password?
   Keep me logged in
   Log in
   or
   Continue with Google
   No account? Sign up
   

Company
About us
News
Careers
Support
Help Center
Business solutions
Advertising
Recruiting

© 2008-2022 ResearchGate GmbH. All rights reserved.
 * Terms
 * Privacy
 * Copyright
 * Imprint