computer security ( IDS Assessment)

Cancelled Posted Nov 12, 2011 Paid on delivery
Cancelled Paid on delivery

Hi

I am looking for someone to help me to do the following coursework please

**Outline Requirements

**

A company (JoeNapier plc) has created a new Web infrastructure built around a

Linux Web core. It runs a number of services, and the aim of the assignment is to

perform an assessment for their Web system, and implement an outline intrusion

detection system to overcome the threats that they are worried about. The key tasks

are thus:

***** Perform an evaluation of the key services within their infrastructure.

***** Develop and implement a strategy to detect the network scanning of their

system.

***** Develop and implement a strategy to detect activities which involves the login

of an administrator through Telnet or FTP.

***** Develop and implement a strategy to detect a malicious Bot agent (to be

given).

Do not perform these activities on any address space apart from with the

Napier Cloud or on your own VM private network.

Details are below.

**

**

## Deliverables

**![][1] **Detailed Requirements:**

** **

The aim is to create a prototype of a system which outlines how the system works.

You should implement an agent-based system based on the requirments listed

above, either using: your own agent (using Winpcap and .NET or Java); a standalone

version of Snort; or using a graphical management system which interfaces to

Snort (a mixture of Snort, Winpcap and .NET). Overall the alerts should be useful,

and, possibly, stored in a secure manner.

The Bot code can be downloaded from:

[url removed, login to view]

Note: that the Bot code is not malicious in any way.**

The Coursework will be

**Introduction

**This should be a summary of the problem definition, research scope, aims and the structure and main content of the report.

Requirements Analysis and Design

This should show the analysis related to the main requirements both theory and practice, and an outline of the proposed system, with the main design features.

**Outline implementation

**This should define an outline implementation of the IDS, which demonstrates the key implementation elements of the proposed IDS Sensor. You should provide Snort rules and their description with justification of the rules' components.

**Test and Evaluation:

**This should outline the results of the testing performed on the system that shows the precision and effectiveness of your solution in terms of detecting unwanted traffic. You should also provide evaluation of the system as a whole with possible scope for improvements.

**Conclusions :

**This should reflect the main findings and methods you have used in the system. Assess strengths and weaknesses of your work, and any observations that you have gained. Also include possible future enhancements to the system.

**References/Presentation :

**All references must be defined in an APA/Harvard format, and should be cited throughout the report.

The report should use the APA/Harvard format for all of the references, and, if possible, should include EVERY reference to material sourced from other places.

Please remember that this is not a report in which "cut-and-paste" from the web is either sufficient of useful. It must be in YOUR words and opinion is YOUR PERSONAL REFLECTION on the topic, based and supported by the references used.

If you have attempted this coursework before, and are repeating the coursework as a resit attempt, you can re-submit the same topic. However, each attempt must be a completely new attempt with all new words! Do not just submit what you said already with extra changes or edits. In short, DO NOT USE ANY TEXT FROM A PREVIOUS ATTEMPT.

Computer Security Training Web Security

Project ID: #3690127

About the project

Remote project Active Nov 12, 2011