> I have a project based on parallel network area. It is an IDS that use to detect the suspicious network packets. In this program, we create a hybrid algorithm which read the network packets from the trace file (DEFCON11) and compare it with the Snort signature rule set database. (All data base are available and will provided by me).
[url removed, login to view] requirements notice: As originally posted, this project does not have complete details. Should a dispute arise and this project go into arbitration "as is", the contract's vagueness might cause it to be interpreted against you, even though you were acting in good-faith. So for your protection, if you are interested in this project, please work-out and document the requirements onsite.