Please use this identifier to cite or link to this item:
Title: Development of a network intrusion detection system (IDS)
Authors: Yeoh, Alexander Weil Tine
Keywords: DRNTU::Engineering::Electrical and electronic engineering
Issue Date: 2017
Abstract: Cybersecurity is increasing its significance over the years due to the overwhelming use of electronic devices which requires the use of internet where the existence of internet has helped our current era to inter-connect with one another in a much easier and more efficient way as compared to centuries before. However, with an excellent tool available on hand, there is always bound to be people with intentions to abuse the tool for personal gains which brings our attention towards hackers in this aspect. This brings forth the importance of having to step up the preventive measures against hackers as they are constantly upgrading their methodologies and techniques to penetrate a system and committing theft for several important information such as credit card numbers, confidential company information etcetera. The scope of this project is to setup and use a Network Intrusion Detection System in a virtual environment whereby the administrator of a specific system can monitor and detect the network for any malicious activity while other virtual systems will be simulating as attackers and victims in different scenarios to justify the succession rate of the Network Intrusion Detection System. In this report, we will discuss on the network configuration setup via virtualization technology followed by having a Network Intrusion Detection System installed in one of the virtual machines port mirrored to monitor the whole network. In the virtual network, virtual machines will be assigned as attackers to simulate cyber-attacks allowing the Network Intrusion Detection System to detect the Internet Protocol address from the source of malicious activity provider. Several forms of attacks will be simulated such as Distributed Denial of Service, Ping of Death, search for malicious content words over the internet and File Transfer Protocol Brute-Force attack for root access and eventually be detected by the Network Intrusion Detection System using various rules which detects by various patterns or algorithms.
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
  Restricted Access
Development of a Network Intrusion Detection System (IDS) Final Report1.46 MBAdobe PDFView/Open

Page view(s)

Updated on Jun 13, 2021

Download(s) 50

Updated on Jun 13, 2021

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.