Network Security

Network Intrusion Detection based on pattern matching.

Project Scope:

To develop a network intrusion detection program with Python and tshark, which would detect patterns in packet payload and logs the IP address from which the packet originated.

Hardware and Software

O/S (2 nos) – Ubuntu and Windows 7 (Linux systems can be used in lieu of Windows)
Switch ( 1 nos)
Tshark – Free download
Python – Free download
Scapy – Free download
Wireshark – Free download

Lab Topology

Ubuntu and Windows 7 system is connected to a switch, and configured with IP addresses belonging to the same network. The Intrusion detection code runs on Ubuntu and packet with pattern is crafted and sent from Windows 7.

Code Output

The packet with pattern “attack” is injected from the Windows 7 system to the code which is running on Ubuntu. The output of the code on Ubuntu is shown below.

Network intrusion detection project

——————————————————————————————————————-

Buy the report – Contents below

1. Project Scope
2. Hardware and Software.
3. Network topology diagram
4. Network setup procedure.
5. Code logic
6. Coding process
7. Code explanation – Python code on ubuntu, scapy code on windows 7
8. Code testing and verification process

No of Pages – 7

Report format – PDF

Price – $15

——————————————————————————————————————–

Click on the Add to Cart button to buy and download with PayPal or credit card on PayPal website

Add to Cart

The report would be downloaded immediately after successful payment and you would also receive a copy of the report in the email used for payment.

——————————————————————————————————————-

If you are based in India, please send us an email for purchasing the report – Click to Email

Best Sellers and Latest Reports – Click Here

Custom Project Help – Click Here

—————————————————————————————————————–


Network Security Design Proposal for Small Office

Project Scope

A network security proposal has to be designed for a small office with security as utmost priority. The organization has about 100 users. There is a web server on the network, which is accessible from the internet. The employees should also have wireless access to the network. All the users should have access to the internet.

Requirements

1.Identify hardware like switches and access points with appropriate security features for LAN security
2.Identify router for broadband internet sharing.
3.Identify appliance to protect the web server from attackers and malicious content the internet.
4.IP network design with table for the organization.
5.Wireless security with appropriate security features should be made available
6.Wireless network integration of access points (5 nos) with LAN with appropriate security.
7.The user computers and the web server should be protected with appropriate antivirus solution.
8.Network Topology diagram.

Buy the Solution report which contains the following contents

Report Contents

1. Project Scope
2. Requirements
3. Infrastructure hardware requirement analysis
4. Network Topology diagram
5. Network Integration procedure
6. Security attacks and mitigation features.
7. IP Network Design
8. IP Network Design Table.
9. Network Solution explanation based on requirement.
10. Hardware and Software List

Report format – PDF

No of Pages – 6

Price – $18

——————————————————————————————————————–

Click on the Add to Cart button and make the payment with a PayPal account or credit card on PayPal website.

Add to Cart

The report would be downloaded immediately after successful payment and you would also receive a copy of the report in your email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click Here

Custom Project Help – Click Here


LAN Security assesment Proposal

Project Scope:

In the project, a network and security consultancy services organizations has been hired to understand the current LAN infrastructure design of an organization, perform a LAN security assessment,

Read more »

Active and Passive FTP Design and Security analysis

Abstract

The project does a detailed analysis of the two different types of the FTP protocol, Active and Passive. The design of the protocols, which include the TCP connection establishment on the respective ports,

Read more »