Network intrusion system, Computer Network Security

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 2003) connect to the gateway machine (with ubuntu platform) .Any interaction to the honeypots assumed as suspicious and system alert must be generated. Description of each part as follow:

1- The honeypots devices provide services to the user like ftp, http, pop3, telnet, ssh.

2- Gateway machine provide centralized logging of all devices in the network, run host based detection system (snort), run the system package.

3- System package contain 5 modules

Posted Date: 3/19/2013 6:11:53 AM | Location : United States







Related Discussions:- Network intrusion system, Assignment Help, Ask Question on Network intrusion system, Get Answer, Expert's Help, Network intrusion system Discussions

Write discussion on Network intrusion system
Your posts are moderated
Related Questions
types of firewall and backup

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data