Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
• Wireless IDP
Network IDPS has several protocols. Such as application, transport, network and
hardware. These protocols examine the network traffic and detect any intrusion
in the hosts. I’ll follow up on any possible way to break the security and most
effective way to prevent them.
Wireless IDP
Wireless IDP monitor wireless network traffic and check its wireless networking
protocols ( e.g. unauthorized WLANs and WLANS devices, poorly secured WLAN
devices, unusual usage patterns, denial of service(DOS) attacks) to discover any
kind of intrusion. My target is to figure out the causes and prevent them with
comparatively better software.
Host-Based IDP examines the attribute of a distinct host and the proceedings
taking place within that host for doubtful activity. Examples of which type of
attribute a host-based IDP might monitor are network traffic (only for that host),
system logs, running processes, application activity, file access and modification,
and system and application configuration changes. It is most frequently
deployed on critical hosts like publicly accessible servers and servers containing
sensitive information.
Objectives:
Resources:
Hardware:
Web server
Laptop
Software:
Snort
EagleX
KFSensor
Others:
Internet, books.
Schedule:
Project outline:
• Literature Review
• Intrusion detection methodologies
• IDPS Technologies
• Types of IDPS
Network based IDPS.
Wireless IDPS.
Network activities anomaly detection.
Host based IDPS.
• Using and Integrating Multiple IDPS Technologies
• Discuss about IDPS Software
• Computer Attack Methodology
• Analysis