Network intrusion system, Computer Network Security

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 2003) connect to the gateway machine (with ubuntu platform) .Any interaction to the honeypots assumed as suspicious and system alert must be generated. Description of each part as follow:

1- The honeypots devices provide services to the user like ftp, http, pop3, telnet, ssh.

2- Gateway machine provide centralized logging of all devices in the network, run host based detection system (snort), run the system package.

3- System package contain 5 modules

Posted Date: 3/19/2013 6:11:53 AM | Location : United States







Related Discussions:- Network intrusion system, Assignment Help, Ask Question on Network intrusion system, Get Answer, Expert's Help, Network intrusion system Discussions

Write discussion on Network intrusion system
Your posts are moderated
Related Questions
what are the participant of marketing channal?

Describe the process a proposed standard goes through to become an RFC

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In