By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.

Slides:



Advertisements
Similar presentations
E-Learning 2 nd Layer Training ID (Instructional Design) by PENY ISWINDARTI.
Advertisements

Addressing IPv6 Vulnerabilities on Small Business Networks Bradley HainesVincent Pullano University of Cincinnati College of Education, Criminal Justice,
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
MONITORING TOOLS Open Source Security Tools to monitor your network.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Honey Inspector Mike Clark Honeynet Project. Honeynet Inspector  Background.
ITIS3100 By Fei Xu. Acknowledge This document is basically a digest from “Wireshark User's Guide for Wireshark 1.0.0” You can download the software.
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy.
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Host Intrusion Prevention Systems & Beyond
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
BY Zoher & Mahmoud. What is WAMP?  - Acronym for Windows/Apache/MySQL/PHP, Python, (and/or) PERL  - WAMP refers to a set of free open source applications,
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Tutorial 11 Installing, Updating, and Configuring Software
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
CPMT 1451 IT Essentials: PC Hardware and Software ITCC 1301 Cisco Exploration 1: Network Fundamentals ITCC 1304 Cisco Exploration 2: Routing Protocols.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
SNORT Tutorial Sreekanth Malladi (modifying original by N. Youngworth)
Honeypot and Intrusion Detection System
EAACK—A Secure Intrusion-Detection System for MANETs
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
NETWORK ADMINISTRATOR. EXAMPLES OF SOME COMPUTING RELATED CAREERS Multimedia Artist / Graphics Artist Information System Manager Computer Scientist Network.
Computer Emergency Notification System (CENS)
The Scalable Virtual Network Senior Design III – Spring Quarter Eric Ridder Sean Stroh.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Get rid of troubles with Dr.Web CureNET! (Quick Start) If your house is on fire, you call for a fire brigade. When malware ravages through your network,
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for Security and Virtual Private Network.
Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.
Network Security Part III: Security Appliances Firewalls.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Retina Network Security Scanner
NetTech Solutions Protecting the Computer Lesson 10.
Microsoft Windows 2008 Features and Functionality Guy Wilkin.
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Greg Steen.  What is Snort?  Snort purposes  Where can it be used?
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Web Site for Network Security and Virtual Private.
Securing Web Access Senior Design III – Spring 2009 Matt Shea.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
By: Matt Daly, Blake Valls, Daniel Ward Senior Design
STUDENT ORGANIZATION WEB SITE Matthew Doering June 7, 2010.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
SEC.FAIL Information Security Defense Lab Setup. SEC.FAIL Instructions Each team will need to operate on a separate system profile. For the labs, you.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Some Great Open Source Intrusion Detection Systems (IDSs)
ITEC 275 Computer Networks – Switching, Routing, and WANs
CISOs Guide To Communicating WNCRY.
Customer & Inventory Management System: CIMS
Real-time protection for web sites and web apps against ATTACKS
Oracle Database Administration
DT249/4 Information Systems Engineering Lecture 0
NETWORK SECURITY LAB Lab 9. IDS and IPS.
Gregory Morton COSC380 February 16, 2011
Web design for small busniess
Internet Engineering Course
Presentation transcript:

By: Paul Albert

 Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion

 This project creates an easy-to-implement, accurate, and low-cost solution for discovering, mitigating, and reporting bots and botnet activity on a network, along with many other types of malicious network attacks  Small businesses to large companies  Flexible  Scalable

 Ubuntu – Version 9.10  Snort IDS – Version ◦ IPS Functionality  MySQL  Basic Analysis and Security Engine (BASE)  Barnyard2 – Version  Perl  VirtualBox – Version  Windows XP  BackTrack 4

 Can vary based on the size of the network  Ownership of process  Installation ◦ Knowledge to implement solution  Maintenance of IDS and BASE ◦ Knowledge to troubleshoot IDS and BASE ◦ Knowledge to script in Perl  Analysis of IDS and BASE  Receiving and responding to alerts

 VirtualBox Install  Intrusion Detection System (IDS) Setup ◦ Installation of required software ◦ Configuration of required software  Basic Analysis and Security Engine Setup  Mitigation  Scripting ◦ Perl script to assist with install process  Testing ◦ Test to make sure IDS is functioning properly

 There is a need for small, medium, and large sized companies to be able to detect and/or mitigate, and report on malicious activity  Reporting features  Easy-to-implement  Accurate  Low-cost