I have a project based on parallel network area. It is an IDS that use to detect the suspicious network packets. In this program, we create a hybrid algorithm which read the network packets from the trace file (DEFCON11) and compare it with the Snort signature rule set database. (All data base are available and will provided by me).
Please read the project first and write the word "Understood". Also write your steps and suggestions to complete the project with a short description of what you understood.