Create a host-based intrusion detection application

Assignment Help Programming Languages
Reference no: EM132301801

Host-based IDS - Course Project

1 PROJECT OVERVIEW

The main objective of this course project is to apply the theoretical knowledge learned in the class on intrusion detection system and cryptography towards developing a practical system. Your task is to create a host-based intrusion de- tection application in shell script. The purpose of the application is to help an administrator in monitoring the file systems on a computer to detect changes to files, i.e., to detect possible intrusions. The application has the following two parts.

1. creation of a list (usually a text file) of file names and their attributes, and

2. stepwise testing of all the files included in the list.

For your reference, one of the widely used commercial host-based IDS is Trip- wire [5]. An open source version of Tripwire is also available at Github [3]. A number of similar applications also exist, for example GNU-licensed software AIDE (Advanced Intrusion Detection Environment) [1]. Other file integrity tools can also be found on the Internet, e.g., FCheck [2] and sXid [4].

2 TERMINOLOGIES
A verification file is a text file containing a list of names of files and directo- ries and their properties. This file is the output generated by your application. This verification file has to be generated before checking for possible intru- sions. During verification, the entries of the verification file are compared to the actual file system. If an entry matches the current properties of a file or directory in the file system, verification of that file/directory succeeded. The properties describe about different kinds of files and links, for example regular files, symbolic link files, or directory files.

3 REQUIREMENTS
The application must be written in shell script that can run in shell script. Other script languages (Perl, Ruby, etc.) or programming languages (C, C++, Java, etc.) are also not accepted.

DATA COLLECTION
You must create a directory including a number of files and directories. Sev- eral pieces of information about files and directories (e.g., file type, access control, word count, owner, last date of modification etc.) are to be collected by your script. The collected information should be stored in a text file which is later used by the script to verify the files, directories, etc., included in the output file.

Checksums, e.g., MD5 and SHA-1, should be calculated for all regular files. The following information should be collected about all regular files, directory

files and symbolic links:
• full path and file name

• file type, one of the appropriate strings: regular file, directory, symlink

• access mode, in text format (e.g. -rwxr-r-)

• owner id and group id

• time of last modification and last file status change
Your script may change the modification time of files and directories during execution. This is not acceptable and is one of the challenges that your script will have to manage.

COMMAND LINE OPTIONS
The application must support at least the following command line options:

Options

Meaning

-c name

Create a verification file called 'name' also display a message "File created"

-o name

Display the results on the screen also save the outputs to an output file

ALLOWED TOOLS
It is allowed to use the Bourne shell and the standard tools included in the Ubuntu. The following commands/programs are examples, and recommen- dations, of such programs:
• access, awk, chflags, echo, file, less, ls, md5, more, printf, sed, sort, touch, wc
• Manual pages are available for all of these programs. Use the man pro- gram to access them (read man's manual if you have not used it before: type man man).

4 REPORT
The report should include a cover page (with submission details, name, id, date, course code etc.), an introduction, explanation of different modules of the program, findings, and a summary (length of the report should be within 5 pages, not counting the cover page and appendix).

Attachment:- Applied Network Security.rar

Reference no: EM132301801

Questions Cloud

Important ethical factors : Why are diversity and discrimination are two important ethical factors that leaders should focus on while attempting to manage their workforce?
Discuss aspect of the connection to global health : Choose one of the following books and write 2-3 page report on any aspect of the connection to global health (title and reference page not included in page).
Good idea for organizations to implement : Are corporate outreach and company sponsored volunteer programs a good idea for organizations to implement?
Describe your approach to care in detail : Mr. P is a 76-year-old male with cardiomyopathy and congestive heart failure who has been hospitalized frequently to treat CHF symptoms.
Create a host-based intrusion detection application : 3809ICT - Applied Network Security - Griffith University - create a host-based intrusion detection application in shell script
Major factors affecting group behavior in organizations : What are three major factors affecting group behavior in organizations?
Strategies for managing those conflicts in the workplace : Describe the types of conflict Janice and other managers may face in the workplace, their underlying causes and some strategies for managing those conflicts in
Determine the measurement levels of each variable : Assignment - Testing to Find Relationships between Two Variables - Determine the measurement levels of each variable
Examine a current ethical controversy case study : Bioethics Case Study: This assignment asks you to examine a current ethical controversy case study. The paper is informal, but should be in APA style, and does.

Reviews

len2301801

5/8/2019 10:34:38 PM

5 SUBMISSION GUIDELINES This project will be completed by group less or equal than (<= 3) students. Individual work is allowed too, but quantity and quality requirements are the same. You will have to submit both source code and report (in pdf format). Your source code will be taken a plagiarism check. The submission deadline is on However, you have to demonstrate your code on week 11 workshop. 6 MARKING SCHEME The overall marks for this project is 20 marks. The following marking scheme would be applied to the project. Implementation & Testing Report Demonstration Total 45% 35% 20% 100%

Write a Review

Programming Languages Questions & Answers

  Write program simulate checkout line at supermark

Write the program which simulates checkout line at supermarket. Line is a queue object. Customers( i.e customer objects) arrive in random integer intervals of 1-4 minutes.

  Define simple encryption application

(Simple Encryption Application) This application uses a simple technique to encrypt a number. Encryption is the process of modifying data so that only those intended to receive the data can undo the changes and view the original data.

  Display the software developers data on the console

Meets specifications by demonstrating file handling, array data structure manipulation, and console output mastery by accomplishing the following.

  Abstract syntax for interpretation in haskell or prolog

State an abstract syntax of the while language appropriate for interpretation in either Haskell or Prolog. In Haskell, the definition must be the code of a few data types.

  Write a vhdl code for soda vending machine

Write a VHDL code that implements the above soda machine. You have to turn in the following: A state diagram showing the implementation of your design. Clearly show all the states and the conditions on which transitions occur.

  Payroll program for a large organization

You have been tasked with building a payroll program for a large organization with offices spread across the United States. The company has one larger data center that each office connects to via a wide area network (WAN)

  Android code using android studio

The code should perform two things: Run accelerometer recorder (which is an app that comes with all android phones) Run an app called custom vibe

  Ruby on rials to design app

Use ruby on rials to design app. It has to have a database and at least 4 pages Style is free you can design it as the way that you like

  Write program to calculate integer part of quotient

Write program segments that accomplish each of the following tasks:Calculate the integer part of the quotient when integer a is divided by integer. Calculate the integer remainder when integer a is divided by integer b.

  Display each word together with its associated line numbers

In addition to the words in a section of text, a concordance usually stores the numbers of selected pages on which there is a significant use of the word.

  Write a program that will operate the alarm simulation

Write a program that will operate the Alarm Simulation, using the following inputs and outputs and whatever Timers and Flags are required.

  Write program to read data for employee and print name

Write a program which reads data for employee and prints name and salary of employee. Data read is: Name. Number of hours worked.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd