Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.

Slides:



Advertisements
Similar presentations
IT Technical Support South Nottingham College. Aims Knowledge of the Registry Discuss the tools available to support a technician Gain an understanding.
Advertisements

3 Copyright © 2005, Oracle. All rights reserved. Designing J2EE Applications.
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Components of GIS.
Visualization tool for network forensics analysis using an Intrusion Detection System ( Cyber ViZ )
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 OBJECTIVES To generate a web-based system enables to assemble model configurations. to submit these configurations on different.
Visualization Kenny Inthirath.  Reviewing a Suitable Technique to Use  Scope and Purpose  What types of models can be represented?  Architectural.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Oracle Database Architectures Are Extremely Complex, And Very Expensive. All of Their Complexity Goes Away ! The Snippet Engine Network Architectures Are.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Copyright © 2005, GemStone Systems Inc. All Rights Reserved. A Capstone with GemStone David Whitlock April 18, 2005.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Website Hardening HUIT IT Security | Sep
Conceptual Architecture of PostgreSQL PopSQL Andrew Heard, Daniel Basilio, Eril Berkok, Julia Canella, Mark Fischer, Misiu Godfrey.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 13 Slide 1 Application architectures.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
The SAM-Grid Fabric Services Gabriele Garzoglio (for the SAM-Grid team) Computing Division Fermilab.
Penetration Testing Security Analysis and Advanced Tools: Snort.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Central Online Grading System COGS Dec15-21 dec1521.sd.ece.iastate.edu.
Using Windows Firewall and Windows Defender
COEN 252 Computer Forensics
Cognos TM1 Satya Mobile:
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team: Gladiator Team: Gladiator Shuxin Li.
Vantage Report 3.0 Product Sales Guide
Module 7: Fundamentals of Administering Windows Server 2008.
Windows 7 Firewall.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Advanced topics in OpenCIM 1.CIM: The need and the solution.CIM: The need and the solution. 2.Architecture overview.Architecture overview. 3.How Open.
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Linux Networking and Security
A Networked Machine Management System 16, 1999.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Kickstart Installation
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
ABone Architecture and Operation ABCd — ABone Control Daemon Server for remote EE management On-demand EE initiation and termination Automatic EE restart.
Module 5: Creating and Configuring Group Policies.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
EXPOSING OVS STATISTICS FOR Q UANTUM USERS Tomer Shani Advanced Topics in Storage Systems Spring 2013.
Retina Network Security Scanner
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Module 10: Windows Firewall and Caching Fundamentals.
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
Real Time and Forensic Network Data Analysis Using Animated Combined Visualizations Sven Krasser Gregory Conti Julian Grizzard Jeff Gribschaw Henry Owen.
RIA to visualize the health of a project Team #4 Midterm presentation February 28,2008.
ALERT MESSAGING SYSTEM Submitted by Submitted by Vinish.A Vinish.A Vindhya.K.V Vindhya.K.V Drishya.T.M Drishya.T.M Leeshma.A Leeshma.A.
Maintaining and Updating Windows Server 2008 Lesson 8.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 6-1 Chapter 6 Decision Support System Development.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Autonomous Network Alerting Systems and Programmable Networks
Intrusion Detection Systems
Presentation transcript:

Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System

Overview Project Objectives High Level Overview Project Management Strategies Risk Analysis Component Overview Lessons Learned Conclusion

Project Objectives Apply knowledge of computing and design to solve the given Problem Employ proper communication and teamwork skills Perform research on related topics to gain a full understanding of the problem

High Level Overview Cyber Situational Awareness System 3 Core Components Score Server Back End Provides Real Times Scoring Score Server Front End Provides a nice User interface and administrative panel Real Time Traffic Visualization System Consists of Back End and Graphical Front End Animation of Network Status

Project Management Strategies Iterative Software Development Model Planning, Analysis and Design, Testing, Evaluation Allows for rapid development More Suitable to research based development Deadline driven development Tools Project Timeline Gannt Chart Iteration Tracker Issue Tracker Google Code Repository and Wave

Risk Analysis and Mitigation Medium Risk Project Compressed Timeline and High Complexity Iterative Development Weekly Branching Chain of Command Limited existing resources 1 Week research period Appointing knowledgeable resources to each team

Component Overview: Score Server To be filled in by teams

Component Overview: Score Server Front End To be filled out by teams

Component Overview: Real Time Network Analysis Objectives Maintain real-time awareness of active network nodes Detect possible attacks and remote login attempts across network Visualize real-time network traffic Present results to Front End for display

Component Overview: Real Time Network Analysis Real-time Network Analysis Abbreviated PERT Chart

Component Overview: Real Time Network Analysis Real-time Network Analysis Data Flow Diagram

Component Overview: Real Time Network Analysis Node Detection Uses bash scripting Uses Nmap for port scanning Expands to multiple network configurations Detects and caches OS information Detects running services

Component Overview: Real Time Network Analysis Attack Detection Provides the audience a way to view attacks across the network. Uses Snort Intrusion Detection System for deep packet inspection Parses snort alert files to gain all of the pertinent information Sends the information to a database for communication with front end

Component Overview: Real Time Network Analysis Traffic Statistics Uses IPTraf for byte level traffic reports Reads traffic between subnets (teams) Uses Javascript front-end Displays real-time current traffic Displays total traffic information

Component Overview: Real Time Network Analysis Communications Interface Log Parsing Database Management XML generation

Component Overview: Real Time Network Analysis Lessons Learned Found scope creep to be an issue Learned importance of synchronized development Used new tools and techniques

Lessons Learned Iterative Development – Great for time compressed and research driven projects Real World Pressure of Must deliver deadlines

Summary Project Objectives High Level Overview Project Management Strategies Risk Analysis Component Overview Lessons Learned Conclusion

Questions?