Development of a network intrusion detection system (IDS)
Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuri...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/71471 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-71471 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-714712023-07-07T17:22:14Z Development of a network intrusion detection system (IDS) Yeoh, Alexander Weil Tine Chan Chee Keong School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuries before. However, with an excellent tool available on hand, there is always bound to be people with intentions to abuse the tool for personal gains which brings our attention towards hackers in this aspect. This brings forth the importance of having to step up the preventive measures against hackers as they are constantly upgrading their methodologies and techniques to penetrate a system and committing theft for several important information such as credit card numbers, confidential company information etcetera. The scope of this project is to setup and use a Network Intrusion Detection System in a virtual environment whereby the administrator of a specific system can monitor and detect the network for any malicious activity while other virtual systems will be simulating as attackers and victims in different scenarios to justify the succession rate of the Network Intrusion Detection System. In this report, we will discuss on the network configuration setup via virtualization technology followed by having a Network Intrusion Detection System installed in one of the virtual machines port mirrored to monitor the whole network. In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. Several forms of attacks will be simulated such as Distributed Denial of Service, Ping of Death, search for malicious content words over the internet and File Transfer Protocol Brute-Force attack for root access and eventually be detected by the Network Intrusion Detection System using various rules which detects by various patterns or algorithms. Bachelor of Engineering 2017-05-17T01:58:54Z 2017-05-17T01:58:54Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/71471 en Nanyang Technological University 57 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Yeoh, Alexander Weil Tine Development of a network intrusion detection system (IDS) |
description |
Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuries before. However, with an excellent tool available on hand, there is always bound to be people with intentions to abuse the tool for personal gains which brings our attention towards hackers in this aspect. This brings forth the importance of having to step up the preventive measures against hackers as they are constantly upgrading their methodologies and techniques to penetrate a system and committing theft for several important information such as credit card numbers, confidential company information etcetera. The scope of this project is to setup and use a Network Intrusion Detection System in a virtual environment whereby the administrator of a specific system can monitor and detect the network for any malicious activity while other virtual systems will be simulating as attackers and victims in different scenarios to justify the succession rate of the Network Intrusion Detection System. In this report, we will discuss on the network configuration setup via virtualization technology followed by having a Network Intrusion Detection System installed in one of the virtual machines port mirrored to monitor the whole network. In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. Several forms of attacks will be simulated such as Distributed Denial of Service, Ping of Death, search for malicious content words over the internet and File Transfer Protocol Brute-Force attack for root access and eventually be detected by the Network Intrusion Detection System using various rules which detects by various patterns or algorithms. |
author2 |
Chan Chee Keong |
author_facet |
Chan Chee Keong Yeoh, Alexander Weil Tine |
format |
Final Year Project |
author |
Yeoh, Alexander Weil Tine |
author_sort |
Yeoh, Alexander Weil Tine |
title |
Development of a network intrusion detection system (IDS) |
title_short |
Development of a network intrusion detection system (IDS) |
title_full |
Development of a network intrusion detection system (IDS) |
title_fullStr |
Development of a network intrusion detection system (IDS) |
title_full_unstemmed |
Development of a network intrusion detection system (IDS) |
title_sort |
development of a network intrusion detection system (ids) |
publishDate |
2017 |
url |
http://hdl.handle.net/10356/71471 |
_version_ |
1772827339329110016 |