Development of a network intrusion detection system (IDS)

Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuri...

Full description

Saved in:
Bibliographic Details
Main Author: Yeoh, Alexander Weil Tine
Other Authors: Chan Chee Keong
Format: Final Year Project
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/71471
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-71471
record_format dspace
spelling sg-ntu-dr.10356-714712023-07-07T17:22:14Z Development of a network intrusion detection system (IDS) Yeoh, Alexander Weil Tine Chan Chee Keong School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuries before. However, with an excellent tool available on hand, there is always bound to be people with intentions to abuse the tool for personal gains which brings our attention towards hackers in this aspect. This brings forth the importance of having to step up the preventive measures against hackers as they are constantly upgrading their methodologies and techniques to penetrate a system and committing theft for several important information such as credit card numbers, confidential company information etcetera. The scope of this project is to setup and use a Network Intrusion Detection System in a virtual environment whereby the administrator of a specific system can monitor and detect the network for any malicious activity while other virtual systems will be simulating as attackers and victims in different scenarios to justify the succession rate of the Network Intrusion Detection System. In this report, we will discuss on the network configuration setup via virtualization technology followed by having a Network Intrusion Detection System installed in one of the virtual machines port mirrored to monitor the whole network. In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. Several forms of attacks will be simulated such as Distributed Denial of Service, Ping of Death, search for malicious content words over the internet and File Transfer Protocol Brute-Force attack for root access and eventually be detected by the Network Intrusion Detection System using various rules which detects by various patterns or algorithms. Bachelor of Engineering 2017-05-17T01:58:54Z 2017-05-17T01:58:54Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/71471 en Nanyang Technological University 57 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Yeoh, Alexander Weil Tine
Development of a network intrusion detection system (IDS)
description Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuries before. However, with an excellent tool available on hand, there is always bound to be people with intentions to abuse the tool for personal gains which brings our attention towards hackers in this aspect. This brings forth the importance of having to step up the preventive measures against hackers as they are constantly upgrading their methodologies and techniques to penetrate a system and committing theft for several important information such as credit card numbers, confidential company information etcetera. The scope of this project is to setup and use a Network Intrusion Detection System in a virtual environment whereby the administrator of a specific system can monitor and detect the network for any malicious activity while other virtual systems will be simulating as attackers and victims in different scenarios to justify the succession rate of the Network Intrusion Detection System. In this report, we will discuss on the network configuration setup via virtualization technology followed by having a Network Intrusion Detection System installed in one of the virtual machines port mirrored to monitor the whole network. In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. Several forms of attacks will be simulated such as Distributed Denial of Service, Ping of Death, search for malicious content words over the internet and File Transfer Protocol Brute-Force attack for root access and eventually be detected by the Network Intrusion Detection System using various rules which detects by various patterns or algorithms.
author2 Chan Chee Keong
author_facet Chan Chee Keong
Yeoh, Alexander Weil Tine
format Final Year Project
author Yeoh, Alexander Weil Tine
author_sort Yeoh, Alexander Weil Tine
title Development of a network intrusion detection system (IDS)
title_short Development of a network intrusion detection system (IDS)
title_full Development of a network intrusion detection system (IDS)
title_fullStr Development of a network intrusion detection system (IDS)
title_full_unstemmed Development of a network intrusion detection system (IDS)
title_sort development of a network intrusion detection system (ids)
publishDate 2017
url http://hdl.handle.net/10356/71471
_version_ 1772827339329110016