Вы находитесь на странице: 1из 12

Submitted To: - Submitted By: -

~ 1 ~
Abhishek Abhishek
Kumar Kumar
Roll No: - Roll No: -
RD1207B40 RD1207B40
Reg No: - Reg No: -
11210885 11210885
Course: - Course: - MCA 5 MCA 5
th th

Sem. Sem. Section: - Section: -
D1207 D1207
Miss. Kavisha Miss. Kavisha
Duggal Duggal
PAPER
CAP617
ACKNOW!D"!M!N#
The experience that we have gathered during this Design
Problem has been unique .For this we are pleased to express
our deepest sense of gratitude and regards to our respected
teacher Miss. Kavisha Duggal for their guidance, inspiration
and constructive suggestions that helps us in the preparation
of the design problem.
I am also thanful to m! classmate
constant encouragement and support.

"
INDEX
SL. NO. ONTENTS !"#E NO.
$ "bst%a&t '
( I)t%odu&tio) *
+ Dist%ibuted Data Mi)i)g ,
' -hy "ge)t. /
* "ge)t Based DDM 0
, Basi& om1o)e)ts o2 "DDM 0
/ M"DM System a) "%&hite&tu%e "11%oa&h 3
0 "ge)t Se&u%ity Issues $4
3 Se&u%ity Measu%e 2o% "ge)t $$
$4 5utu%e S&o1e $$
#
"BST6"T
Distributed Data $ining pla!s ver! important role in networ problems. In a
distributed environment %such as a sensor or IP networ&, one has distributed
probes placed at strategic locations within the networ. The problem here is to
be able to correlate the data seen at the various probes, and discover
Patterns are in the global data seen at all the different probes. There could be
different models of distributed data mining here, but one could involve a '()
that collects data from the distributed sites, and another in which all sites are
treated equall!. The goal here obviousl! would be to minimi*e the amount of
data shipped between the various sites essentiall!, to reduce the communication
overhead. In distributed mining, one problem is how to mine across multiple
heterogeneous data sources+ multi,database and multi relational mining.
-nother important new area is adversar! data mining. In a growing number of
domains email spam, counter,terrorism, intrusion detection.computer securit!,
clic spam, search engine spam, surveillance, fraud detection, shop bots, and
file sharing. Data mining s!stems face adversaries that deliberatel! manipulate
the data to sabotage them %e.g. mae them produce false negatives&. In this
paper need to develop s!stems that explicitl! tae this into account, b!
combining data mining with game theor!.
/
INT6OD7TION
Data mining technolog! has emerged as a means for identif!ing patterns and
trends from large quantities of data. The Data $ining technolog! normall!
adopts data integration method to generate Data warehouse, on which to gather
all data into a central site, and then run an algorithm against that data to extract
the useful $odule Prediction and nowledge evaluation. 0owever, a single
data,mining technique has not been proven appropriate for ever! domain and
data set. Data mining techniques involving in such complex environment must
encounter great d!namics due to changes in the s!stem can affect the overall
performance of the s!stem.
1
DIST6IB7TED D"T" MININ#
Distributed data mining is originated from the need of mining over
decentrali*ed data sources. The field of Distributed Data $ining %DD$& deals
with these challenges in anal!sing distributed data and offers man! algorithmic
solutions to perform different data anal!sis and mining operations in a
fundamentall! Distributed manner that pa!s careful attention to the resource
constraints. 2ince multi,agent s!stems are often distributed and agents have
proactive and reactive features which are ver! useful for 3nowledge
$anagement 2!stems, combining DD$ with $-2 for data intensive
applications is appealing.
The ob4ective of Distributed data mining is to perform the data mining
operations based on the t!pe and availabilit! of the distributed resources. It
$a! choose to download the data sets to a single site and perform the data
mining operations at a central location.
5
-89 "#ENT.
-gent computing whose aim is to deal with complex s!stems has revealed
opportunities to improve distributed data mining s!stems in a number of wa!s.
$ulti,agent s!stems %$-2& often deal with complex applications that require
distributed problem solving. In man! applications the individual and collective
behaviour of the agents depends on the observed data from distributed sources.
- 2oftware -gent is as user6s personal assistant.
-gent can be programmed as compact as possible.
7ight weight agent can transmitted across the networ rather than data
that is more bul!.
The Designing of DD$ 2!stems Deals 8ith
9reat Details of -lgorithms used
o :eusabilit!
o ;xtensibilit!
o :obustness
0ence, the agent characteristics are desirable to use in DD$.
<
"#ENT B"SED DDM
-DD$ s!stem concerns three e!s characteristics
o Interoperabilit!
o D!namic )onfiguration
o Performance -spects
-pplications of distributed data mining include credit card
-uthentication, intrusion detection and all this t!pe general and securit!
related applications.
Into this a novel Data $ining Technique inherits the properties of agents.
The DD$ applications can be further enhanced with agents.
=etter Integration polic! with the communication protocols
Provide a view of online parallel processing
B"SI OM!ONENTS O5 "DDM
-n -DD$ s!stem can be generali*ed into a set of components
Figure+ -n (verview of -DD$
>
M"DM S9STEM "N "68ITET76E "!!6O"8
$-D$ is the -DD$ but equipped with several agents which have
particular goal of functionalit! as+
6esou%&e "ge)t: $aintaining $eta Data Information
Lo&al Tas: "ge)t: 7ocated at the local site
B%o:e% "ge)t: 8oring as -dvisor agent
;ue%y "ge)t: 3DD 2!stem -gent
!%e-!%o&essi)g "ge)t: Preparing data for mining
!ost Data "ge)t: ;valuates the performance and accurac!
6esult "ge)t: -ggregate the all local results
I)te%2a&e "ge)t: Provide Interface to the real world applications
Mobile "ge)t: $igrate based on :equest and :esponse
M"DM S9STEM "N "68ITET76"L
?
"#ENT SE76IT9 ISS7ES
Identification and authentication
-uthori*ation and delegation
)ommunication
o confidentialit!+ assurance that communicated information is not
accessible to unauthorised parties@
o data integrit!+ assurance that communicated information cannot be
manipulated b! unauthorised parties without being detected@
o availabilit!+ assurance that communication reaches its intended
recipient in a timel! fashion@
o 'on,repudiation+ assurance that the originating entit! can be held
responsible for its communications.
$obilit!
2ituated ness
-utonom!
-gent ;xecution
1A
Data Source on
Different Sites
SE76IT9 ME"S76E 5O6 "#ENT
Protecting agents
o Trusted hardware
o Trusted nodes
o )o,operating agents
o ;xecution tracing
o ;ncr!pted pa!load
o ;nvironmental e! generation
o )omputing with encr!pted functions
o Bn,detachable signatures
Protecting the agent platform
o 2andboxing and safe code interpretation
o Proof carr!ing code
o 2igned code
o Path histories
o 2tate appraisal
11
57T76E SO!E
Data $ining and web mining is the hot area of research
Integration of 3DD and -gent technolog! can provide a new wa! to both
For several networ securit! researchers it can provide several new wa!
to find the fraud in the networ as provide fast discover!
:eal time confidential transaction can be mae secure b! the integration
of -gent Technolog!
1"

Вам также может понравиться