Solving real world security problems through hacking and protection

Cyber-Security is a collection of technologies, processes and implementations designed to protect the ever-growing world of digital assets against threats. Over the past decade, cyber security’s importance has grown significantly, in tandem with the exponential growth of electronic devices connectin...

Full description

Saved in:
Bibliographic Details
Main Author: Teo, Brendon Kai Liang
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156667
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-156667
record_format dspace
spelling sg-ntu-dr.10356-1566672022-04-22T05:03:45Z Solving real world security problems through hacking and protection Teo, Brendon Kai Liang Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering::Computer science and engineering Cyber-Security is a collection of technologies, processes and implementations designed to protect the ever-growing world of digital assets against threats. Over the past decade, cyber security’s importance has grown significantly, in tandem with the exponential growth of electronic devices connecting to the internet, especially so given the new challenges that companies must adopt to due to the prevalence of Covid-19. A new wave of telecommunication platforms has risen, fulfilling the WFH and safe-distancing criteria mandated by governments globally. This increased exposure leads to a greater number of surface vectors for potential compromises. Network-Security has as a result seen a huge proportional increase in importance as businesses adapt to new work-from-home models. Company policies such as the Bring Your Own Device (BYOD) only accentuates the growing number of personal devices and hence the need for Cyber Security as they work in tandem, abovementioned. Network Intrusion Detection Systems (NIDS) are amongst the most widely used defences for securing a network which scans each individual packet against a pre-configured list of malicious signatures. The algorithm used in most popular NIDS is “Signature-Based Detection” which offers low false-positive rates that is effective in detecting known security threats in the wild. However, a hacker will always find ways of bypassing and compromising a system, regardless of prior implementation of safety measures for a highly secured network. For this project, I will be setting up a NIDS on a Kali Linux Virtual Machine and testing various forms of attacks that can possibly evade detection by the system. These attacks will range from Packet Fragmentations, False-Positive Drowning attacks and Reverse Shells. Possible measures and implementations will also be provided to help Network Administrators or Users better secure their networks. Bachelor of Engineering (Computer Science) 2022-04-22T05:03:45Z 2022-04-22T05:03:45Z 2022 Final Year Project (FYP) Teo, B. K. L. (2022). Solving real world security problems through hacking and protection. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156667 https://hdl.handle.net/10356/156667 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Teo, Brendon Kai Liang
Solving real world security problems through hacking and protection
description Cyber-Security is a collection of technologies, processes and implementations designed to protect the ever-growing world of digital assets against threats. Over the past decade, cyber security’s importance has grown significantly, in tandem with the exponential growth of electronic devices connecting to the internet, especially so given the new challenges that companies must adopt to due to the prevalence of Covid-19. A new wave of telecommunication platforms has risen, fulfilling the WFH and safe-distancing criteria mandated by governments globally. This increased exposure leads to a greater number of surface vectors for potential compromises. Network-Security has as a result seen a huge proportional increase in importance as businesses adapt to new work-from-home models. Company policies such as the Bring Your Own Device (BYOD) only accentuates the growing number of personal devices and hence the need for Cyber Security as they work in tandem, abovementioned. Network Intrusion Detection Systems (NIDS) are amongst the most widely used defences for securing a network which scans each individual packet against a pre-configured list of malicious signatures. The algorithm used in most popular NIDS is “Signature-Based Detection” which offers low false-positive rates that is effective in detecting known security threats in the wild. However, a hacker will always find ways of bypassing and compromising a system, regardless of prior implementation of safety measures for a highly secured network. For this project, I will be setting up a NIDS on a Kali Linux Virtual Machine and testing various forms of attacks that can possibly evade detection by the system. These attacks will range from Packet Fragmentations, False-Positive Drowning attacks and Reverse Shells. Possible measures and implementations will also be provided to help Network Administrators or Users better secure their networks.
author2 Liu Yang
author_facet Liu Yang
Teo, Brendon Kai Liang
format Final Year Project
author Teo, Brendon Kai Liang
author_sort Teo, Brendon Kai Liang
title Solving real world security problems through hacking and protection
title_short Solving real world security problems through hacking and protection
title_full Solving real world security problems through hacking and protection
title_fullStr Solving real world security problems through hacking and protection
title_full_unstemmed Solving real world security problems through hacking and protection
title_sort solving real world security problems through hacking and protection
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/156667
_version_ 1731235790347829248