Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

5.

SYSTEM DESIGN
5.1 Data Flow Diagram:

Start

Traffic Classification Start Monitoring Monotonic Trend Checking

Collect Results

Separate Misconfiguration Events from Botnet Events

Database

Stop
5.2 Use Case Diagram:

Honeynet

Botnet

Scanning

Hitlist Checking

Event Extraction

Database
5.3 Activity Diagram:

Traffic Classification Start Monitoring Monotonic Trend Checking

Collect Results

Separate Misconfiguration Events From Botnet Events

Database
5.4 Sequence Diagram:

Honeynet Botnet

Attack

Scanning

Hitlist Checking

Event Extraction

Data Storage
5.5 Class Diagram:
Hitlist Checking

Time
Protocol
Source
Destination
Length

Search( )
Scanning Files Insertion( )

Hitlist Checking

Event Extraction
Event Extraction

Scanning( )
Time
Protocol
Source
Destination
Length

Search( )
Insertion( )

You might also like