25170major Report Format

Embed Size (px)

Citation preview

  • 7/28/2019 25170major Report Format

    1/7

    Topic Name

    A

    Major Project Report

    Submitted

    in partial fulfillment

    for the award of the Degree of

    Bachelor of Technology

    in Department of Computer Science and Engineering

    Project Supervisor Submitted By

    Mr. Abhishek Khadolia Student Name

    Assistant Professor Roll No.:

    Department of Computer Science and Engineering

    Rajasthan Institute of Engineering & Technology, Jaipur-302026

    Rajasthan Technical University

    Academic Session

    2012-2013

  • 7/28/2019 25170major Report Format

    2/7

    Rajasthan Institute of Engineering and Technology, Jaipur

    Department of Computer Science and Engineering

    Candidates Declaration

    I hereby certify that the work embodied in this project entitled topic name by

    ______________, roll no. _________in partial fulfillment of the requirements for the award of

    the degree of B.Tech. in CSE submitted Department of Computer Science and Engineering,

    Rajasthan Institute of Engineering and Technology, Jaipur is an authentic record of my own

    work carried out under the supervision ofMr. Abhishek Khadolia. The matter presented in this

    dissertation has not been submitted by me in any other University/Institute for the award of any

    other degree or diploma.

    ....

    (Name of Student)

    Roll No,:

    This is to certify that the above statement made by the candidate is correct to the best of my

    knowledge and belief.

    ...

    (Abhishek Khadolia)

    Assistant Professor

    Department of CSE

    RIET, Jaipur

  • 7/28/2019 25170major Report Format

    3/7

    Rajasthan Institute of Engineering and Technology, Jaipur

    Department of Computer Science and Engineering, Jaipur

    Session 2012-2013

    Topic of the project

    ABSTRACT

    In todays economic environment at one hand enterprises try to balance out and optimize their IT

    budgets, while on other hand increasing vulnerability of organizational data to hacking and other

    intrusive attacks cause enterprises financial disaster. The problem of intruder attack to an

    organization is not new to anyone, either the physical attack such as stealing files from the

    companies locker or the network attack such as person sitting on a network other than companies

    network break the password of a computer with the intention of stealing files. Intruders are using

    more advanced technologies and they are attacking more frequently and disastrous hence

    organizations network and information security is of increasing concern nowadays. It became a

    national threat in 2010, according to CSA (Cloud Security Alliance), it is estimated that there are

    top 07 network attacks to clouds, this is massive. [1] To protect an organization from these types

    of attacks certain policies and systems are implemented.

  • 7/28/2019 25170major Report Format

    4/7

    TABLE OF CONTENTS

    CERTIFICATE....

    ACKNOWLEDGEMENT.......

    ABSTRACT..

    AUTHORS PUBLICATIONS....

    LIST OF FIGURES .

    LIST OF TABLES...

    CHAPTER 1: INTRODUCTION ......

    1.1Motivation1.2 Cloud Computing.

    1.3 Security in Cloud Computing..

    1.3.1 Common Threats to Cloud Computing

    1.4 Intrusion Detection and Prevention System.

    1.5 Detection Methodologies.

    1.6 Problem Identification.

    1.7 Research Objectives.

    1.8 Research Methodology........

    1.9 Research Process..

    1.10 Organization of thesis.. ..

    CHAPTER 2: HYBRID INTRUSION DETECTION SYSTEM

    2.1 Introduction..

    2.2 Existing Hybrid Intrusion Detection System (HIDPS)

    2.3 Proposed Work- Improved HIDS

    i

    iii

    iv

    v

    vi

    viii

    2

    3

    3

    13

    14

    17

    20

    23

    23

    23

    24

    25

    27

    28

    28

    30

    32

  • 7/28/2019 25170major Report Format

    5/7

    2.3.1 Algorithm.

    2.3.2 Flowchart.

    CHAPTER 3: AN IMPROVED HIDS.................................

    3.1 Architectural Design

    3.2 KFSensor.

    3.3 FlowMatrix..

    3.4 Design of a network in Packet Tracer..

    CHAPTER 4: IMPLEMENTATION OF AN IMPROVED HIDS.

    4.1 Analysis of Phase 1..

    4.2 Analysis of Phase 2..

    4.3 Analysis of Phase 3..

    CHAPTER 5: CONCLUSION.......

    5.1 Conclusion. ......

    LIST OF REFERENCES....

  • 7/28/2019 25170major Report Format

    6/7

    LIST OF TABLES

    Table 1: Cloud Service Provider....

    Table 2: Anomaly event occurs on 2nd April at 9:52-10:52 a.m....

    Table 3: Rule events ..

    Table 4: Characteristics observed through overall experiment of KFSensor

    Table 5: Anomaly event.

    Table 6: Rule events.......

    Table 7: Characteristics observed while doing experiments with FlowMatrix.

    Table 8: Characteristics observed while doing experiments with KFSensor and

    FlowMatrix....

    5

    52

    54

    62

    65

    65

    68

    72

  • 7/28/2019 25170major Report Format

    7/7

    LIST OF FIGURES

    Figure 1: Cloud Computing.

    Figure 2: Layers of Cloud Computing....

    Figure 3: Public Cloud....

    Figure 4: Inter Cloud...

    Figure 5: Research Process.

    Figure 6: Flow Chart...

    Figure 7: Architectural Design....

    Figure 8: KFSensor.

    Figure 9: Dashboard Summary....

    Figure 10: Network Design in Packet Tracer..

    Figure 11: Activities by all the three nodes detected by KFSensor....

    Figure 12: Network Activity by the node 20.1.1.20....

    Figure 13: Network Activity by the node 20.1.1.40....

    Figure 14: Anomalous behavior capture by FlowMatrix....

    Figure 15: Anomaly Event count per minute on 2nd April at 9:52-10:52 am..............

    Figure 16: Anomaly Detection in Subspace #1......

    Figure 17: Anomaly Detection in Subspace #1

    Figure 18: Rules Triggered.....

    Figure 19: Packet volume from all devices.

    4

    8

    10

    12

    24

    34

    37

    39

    42

    44

    47

    48

    49

    50

    51

    53

    53

    54

    55