Network intrusion system, Computer Network Security

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 2003) connect to the gateway machine (with ubuntu platform) .Any interaction to the honeypots assumed as suspicious and system alert must be generated. Description of each part as follow:

1- The honeypots devices provide services to the user like ftp, http, pop3, telnet, ssh.

2- Gateway machine provide centralized logging of all devices in the network, run host based detection system (snort), run the system package.

3- System package contain 5 modules

Posted Date: 3/19/2013 6:11:53 AM | Location : United States







Related Discussions:- Network intrusion system, Assignment Help, Ask Question on Network intrusion system, Get Answer, Expert's Help, Network intrusion system Discussions

Write discussion on Network intrusion system
Your posts are moderated
Related Questions
Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv