logo

Basic Project Information Definition

   

Added on  2022-08-15

10 Pages1683 Words12 Views
CE 3.1 Information on the Project
Project Name: Implementation of an Intrusion Detection System or IDS with Canary
Tokens
Project’s Location: Please fill
Duration of the Project: Please fill
Organization’s Name: Please fill
Role as well as Designation in the project: Team Member of the project
CE 3.2 Background of the Project
CE 3.2.1 Basic Characteristics of the Project
An intrusion detection system or IDS can be referred to as a specific system, which
monitors the network traffic for any type of suspicious activity as well as issue for altering as
soon as any such activity is being discovered. IDS is the software application, which scans a
system or a network for any such policy breaching and harmful activity. It helps in
monitoring the network for identification of any type of malicious activity or policy violation.
In this project, I have successfully implemented an Intrusion Detection system for the IoT
enabled sensor networks. The growth of this Internet is evolving majorly for ensuring
effectiveness. An early warning system runs natively on the client side like canary token for
actively tracking each and every trace of the user, who is trying to login to the system and
then dumping the data within real time to the configured dumping methodologies like activity
log and email. One of the major reasons for selection of this specific project was to check for
the lack of security within IoT and since there are no cryptographic protocols present for this
Internet of Things technology. I have used canary tokens, so that we are able to gain update

for server breach. Therefore, with this particular project work, I had executed the work
successfully with canary tokens.
CE 3.2.2 Developed Objectives for this project
This work was being executed by me after proper understanding about various
specifications related to IoT technology and Raspberry Pi. For the purpose of reflecting the
real time working of the application, the canary is being implemented over the Raspberry Pi
that is utilized as the sensor monitoring as well as controlling system. The most significant
and vital objectives in this project work are:
To implement a successful and proper intrusion detection system or IDS, so that the
user is able to get early warning or update for any type of server breach.
To ensure that the proposed system in this work is similar to a specific real time
device of Internet of Things.
To deploy an early warning system that would run natively on the user or canary side
like canary token for actively tracking all the traces of the users, who are logging into
the system as well as dumping the data within real time to the configured dumping
methodologies like activity log and electronic mails.
To reflect the real time working of the application that the canary token in being
implemented over the Raspberry Pi for the purpose of a sensor monitoring and
controlling system.
To use Raspberry Pi as an IoT device with Cayenne IoT for controlling and
monitoring sensors as well as actuators through the Internet connection.
To use Python code for SMTP trigger of the canary tokens.

CE 3.2.3 My working areas in this work
Since I was a successful student from a popular and significant university, it was
extremely easy for me to make this project work of intrusion detection system a successful
one. In the beginning, I chose a proper topic for the work. After selection of this project topic,
I decided to research about the aspects and parameters of Raspberry Pi for making the project
work a proper one, as this was the first time that I was using Raspberry Pi. Moreover, I have
worked with IoT devices in several projects and hence I had idea about the specifications of
such devices appropriately. Being an experienced part of the team, I guided the rest of the
members for successful execution.
CE 3.2.4 Group of People Involved in this Project
Figure 1: Group of Individuals involved in the Work

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Competency Demonstration Report on data logging system
|8
|1639
|42

Implement of Gas Leakage Detector and Auto Dialing Control System | Project
|10
|1835
|149

Information on Project| Assignment
|12
|1746
|22

Prevention of DoS Attacks: Methods and Strategies
|12
|2585
|100

Manage Network and Data Integrity
|62
|2549
|302