Network intrusion system, Computer Network Security

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 2003) connect to the gateway machine (with ubuntu platform) .Any interaction to the honeypots assumed as suspicious and system alert must be generated. Description of each part as follow:

1- The honeypots devices provide services to the user like ftp, http, pop3, telnet, ssh.

2- Gateway machine provide centralized logging of all devices in the network, run host based detection system (snort), run the system package.

3- System package contain 5 modules

Posted Date: 3/19/2013 6:11:53 AM | Location : United States







Related Discussions:- Network intrusion system, Assignment Help, Ask Question on Network intrusion system, Get Answer, Expert's Help, Network intrusion system Discussions

Write discussion on Network intrusion system
Your posts are moderated
Related Questions
(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Discuss the risks of having a single root user

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

why is it that sometime we put password in our account to login or signup and it would not work?

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn