logo

MN692 Capstone Project (pdf)

20 Pages4252 Words34 Views
   

Added on  2021-06-15

MN692 Capstone Project (pdf)

   Added on 2021-06-15

ShareRelated Documents
MN692 Capstone Project Network Intrusion Detection SysteContents1.Introduction..............................................................................................................................2.....................................................................................................................................................63.Table of weekly Activities for MN692.....................................................................................64. Roles & Responsibilities of each team member......................................................................7Implementation of snort.................................................................................................................11Operating with Snort..................................................................................................................12Testing snort..................................................................................................................................15Testing snort basic principles....................................................................................................15Verification of snort intrusion:......................................................................................................15Result Analysis as well as evaluation............................................................................................16Experiment one..........................................................................................................................17Results Analysis.........................................................................................................................17Experiment2...............................................................................................................................18Results Analysis.........................................................................................................................19WEKA...........................................................................................................................................19Conclusion.....................................................................................................................................20
MN692 Capstone Project (pdf)_1
8.References...................................................................................................................................211.IntroductionThe use of internet has increased with the advancement in technology such as smart phonesand high-speed internet. With the increase in a number of web users, the demand for online securityhas increased as well in order to protect digital frameworks from various security breaches. The onlinesecurity breaches and cyber-attacks resulted in compromising security; integrity and authenticity of anetwork because it allows cybercriminals to conduct illegal activities such as file modification andunauthorised access to confidential data [1]. Organisations can use Intrusion Detection System (IDC)which is a software application that monitors the network for policy violations or malicious practices.The detection system are divided in two groups 1. Is Host based intrusion detection system and theother 2. Network based intrusion detection system[2]. In previous few years, the development innetwork security and network-based services has become a crucial factor for organisations. In order toensure security of networks and identify different cyber-attacks, companies used anomaly-basednetwork intrusion detection technique. Techniques which are used in anomaly-based network intrusiondetection include knowledge-based, machine learning based, and statistical based.[3] Companies facechallenges while using different security methods, which are based on existing network data characters,in order to improve their performance. The Network Intrusion Detection System (NIDS) is installed bycorporations at key points of the networkin order to check traffic from and to all hosts that are using anetwork [4].This report will focus on the network intrusion detection system, and it will include thebackground of the topic, and requirements of the project.2
MN692 Capstone Project (pdf)_2
2. Design, implementation and block diagramNetwork Intrusion Detection System (NIDS) is further protection which examines networkactivity to detect attacks or intrusions. NIDS systems can be hardware and software based devices usedto examine an attack. NIDS products are being used to observe connection in detect whether attackshave been launched. NIDS systems just monitor and generate the alert of an attack, whereas others tryto block the attack.The network intrusion detection systems can detect several types of the attacks that use thenetwork. NIDS are excellent for detecting access without authority or some kinds of access in excess ofauthority. A NIDS does not require much modification for production hosts or servers. It is benefitbecause these servers regularly have close operating system for CPU and installing additional softwareupdates may exceed the systems capacities. Most NIDSs are quite easy to deploy on a network and canobserve traffic from multiple machines at once.[5]Figure 1We are using Snort for the network intrusion detection system. Snort is principally a rule-oriented detection system to capture the intrusion. It can perform real-time traffic monitoring, analysisand packet logging on Internet Protocol (IP) networks. Snort reads the rules at the start-up time which3
MN692 Capstone Project (pdf)_3
can be predefined or customised and builds internal data structures or chains to apply these rules tocaptured data. Snort is accessible with a various.Established pre-defined rules to perceive intrusion activity and you can also free to enhanceyour own rules as per the constraint. Below is the block diagram for the snort architecture..Figure 24
MN692 Capstone Project (pdf)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Intrusion Detection System Using SNORT
|51
|9826
|455

MIT141559 IT Security Assignment: Networking Intrusion Detection Systems
|6
|1185
|131

Assignment on Network Intrusion Detection System
|2
|364
|30

Network Intrusion Detection System: MN691 Research Methods and Project Design
|44
|9418
|181

(Doc) Intrusion Detection System
|10
|2535
|219

Demonstration of Network Security Tools
|10
|2109
|85