Nicholas Novello, Shayne Gradwell, Nikolas Todd

Slides:



Advertisements
Similar presentations
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Advertisements

MD025 Clonezilla Server Andrew Fang. School of Information Technology Computer Systems Major.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Network Surveillance Apparatus Team WiFiSpi Aaron Collier, Scott Matheson, Steven Tran-Giang.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
NETWORK SECURITY INTRUSION DETECTION SYSTEMS (IDS) KANDIAH.M Clarkson University, Potsdam, New York.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
By: Paul Albert.  Project Description  Design Protocols  User Profiles  Deliverables  Timeline  Budget  Demonstration  Conclusion.
Solids Modeling System Migration Presented By 3Tech: Ryan Scott, Jimmy Vuong, Samson Tran.
Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
SQL Server for Green Building By HCH Servers Ltd..
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
Tyler Hellard, Taylor Kraft and Zachary Preece.  Project Background  Project Accomplishments  Budget  Conclusion  Acknowledgements  Question and.
On Demand Internet By The Cool Beans Initiative  Hugh Becking  Gary Chung.
By Colin Phan, Ken Lee Marquez, Gyu Beom Choi. Agenda  Introductions  Project Information  Challenges  Successes  Lessons Learned  Budget  The.
Copyright 2004 Sheng Bai1 CommView Report for By Sheng Bai.
Computer Network Forensics Lecture 6 – Intrusion Detection © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering,
A Networked Machine Management System 16, 1999.
Agenda Introductions Project Background AccomplishmentsChallenges Lessons Learned Budget The Journey Final Product Recommendations.
An Intrusion Detection System to Monitor Traffic Through the CS Department Christy Jackson, Rick Rossano, & Meredith Whibley April 24, 2000.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
Bubble Wrap Green Solutions: Kenneth Ho Rajwinder Maan William Wong.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
DEA IT CONSULTING THE TEAM: DAVID CLARKE EMMANUEL CAUBALEJO ADAM WHEATON CIITS Server Infrastructure Optimization.
An overview.
Snort Intrusion detection system Charles Beckmann Anthony Magee Vijay Iyer.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Greg Steen.  What is Snort?  Snort purposes  Where can it be used?
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Jason Ewing. What is an Intrusion Why Detecting Signs of Intrusion is Important? Types of Intrusion Detection Systems (IDS) Approaches for Detection Anomaly.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
SBS Alert Web Console Senior Design 3 – February 28, 2005 Debra Sweet Barrett.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
Tool Support for Testing
The Premier Test Lab Management Software
Monitoring Windows Server 2012
IDS Intrusion Detection Systems
Snort – IDS / IPS.
CSCE 548 Student Presentation By Manasa Suthram
Adam Backman Chief Cat Wrangler – White Star Software
SP-Portal2016 Developed by KRN-2016 Kevin Titong Ricardo Sandrea
© 2002, Cisco Systems, Inc. All rights reserved.
Comparing Linux Firewalls
Our Data Center Structure
Java Embedded Network Intrusion Security
NETWORK SECURITY LAB Lab 9. IDS and IPS.
ICTF EC2 By Daniel Ruiz.
Agenda Introduction Project Background Accomplishments Budget
Automated Infrastructure as a Service
TitaNet Security Flaw Identification
Intrusion Detection Systems
Presentation transcript:

Nicholas Novello, Shayne Gradwell, Nikolas Todd Snort Network Monitoring System Snort Force One Nicholas Novello, Shayne Gradwell, Nikolas Todd

Agenda Introduction Project Background Budget Challenges What is snort? ProxMox Scripts Budget Challenges Lessons Learned Accomplishments Conclusion Acknowledgements References Questions

Project Background What is snort? How does snort work? Provides real time monitoring for suspicious network traffic, to log, alert, drop packets from potential attacks or matching rules. How does snort work? 3 Main operation modes: Sniffer Packet logger NIDS – Network Intrusions Detection System

Project Background: ProxMox What is ProxMox Hypervisor Virtualized software Debian based. Create virtual containers, or machines using a web Interface

Project Background: Scripts Sets a base line for comparison. Displays number of all protocols captured. Essential for statistical analysis to monitor trends, and detect potential variances. May 18, 2019

Budget Item Hours Rate Cost Shayne Gradwell 79.1 $75 $5,932.5 Nikolas Todd 76.5 $5,737.5 Nicholas Novello 83.4 $6,255 Item Initial Budget Actual Budget Hardware $3,040.65 $3,319.89 Operating Costs/Wages $16,650.00 $17,925 Total $19,690.65 $21,244.89 Variance $1554.24

Challenges Time management Hardware issues. Configuration issues: virtualized environment, Snort logging/NIDS flags, Networking.

Lessons Learned Time management is key. Good Information can be hard to find Journaling is important, both for creating an accurate manual and for budgeting. Things are not as easy as you might expect them to be, so plan accordingly.

Accomplishments Secured Virtualized environment - ProxMox Packet logging - Snort box (CentOS container) Perl script to log metrics – Automated Developed adept problem solving skills Strengthened our friendship over the past 13 weeks

Conclusion As a team we hope to utilize and apply all that we have learned these past few months to our career’s and projects in the future. We have thoroughly enjoyed the challenge and experience while looking forward to a career in the IT industry.

Acknowledgments & References We would like to thank: Timothy Williams Colin Chamberlain Dylan Saunders Jason Fisher Images all public domain obtained from: http://pixabay.com/ http://compfight.com/

References Cont. [1] CISCO IT http://www.cisco.com/c/en/us/products/security/content-security-management-appliance/index.html Last accesed 04/12/2014 [2] Snort https://snort.org/ Last accesed 9/4/2015 [3] Proxmox https://www.proxmox.com/en/ Last accesed 9/4/2015 [4] Snort manual http://manual.snort.org/ Last accesed 9/4/2015 [5] CentOS https://www.centos.org/docs/5/html/Deployment_Guide-en-US/s1-networkscripts-interfaces.html Last accesed 9/4/2015 [6] CentOS Wiki http://wiki.centos.org/FAQ/CentOS7 Last accesed 9/4/2015 [7] Vimeo https://vimeo.com/10465331 Last accesed 9/4/2015 [8] SANS http://www.sans.org/reading-room/whitepapers/detection/analysis-snort-data-acquisition-modules-34027 Last accesed 9/4/2015 [9] Snort Cookbook http://commons.oreilly.com/wiki/index.php/Snort_Cookbook Last accesed 9/4/2015 [10] Tamato USB http://tomatousb.org/forum/t-369388/step-by-step-procedure-for-installing-and-configuring-snort Last accesed 9/4/2015 [11] The Geek Stuff http://www.thegeekstuff.com/2010/08/snort-tutorial/ Last accesed 9/4/2015 [12] Proxmox wikia https://pve.proxmox.com/wiki/Main Last accesed 9/4/2015 General Ideas http://www.proj354.com/itcs/10to19/wi2014.htm Last accesed 04/12/2014 General Reference Timothy Williams 26/12/2014 [13] William Parker, https://snort.org/documents/snort-2-9-7-x-on-centos-6-x-and-7-x Last accesed 9/4/2015 [14] CentOs.org, https://www.centos.org/docs/5/html/Deployment_Guide-en-US/s1-networkscripts-interfaces.html Last accesed 9/4/2015 [15] manpagez, http://www.manpagez.com/man/8/snort/ Last accesed 9/4/2015 May 18, 2019

Questions