Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Objective: The objective of this project is to install and run virtual machines with various IPS / IDS tools, evaluate their effectiveness, and compare their
Objective: The objective of this project is to install and run virtual machines with various IPSIDS tools, evaluate their effectiveness, and compare their features and functionalities. Students will need to make a group of or students to do the following:
Test Environment Setup:
Set up a controlled test environment with a minimum of virtual machines in isolated network segments. Its recommended to ensure that the environment mimics a realworld scenario by including various operating systems one of them must be Kali Linux network configurations, and security configurations.
You can do whatever scenario you like but it is recommended to do the following at least:
a You must install and configure your virtual machines.
Hint: For windows users can go with VirtualBox and for Mac users can go with parallels Desktop. If you want as a group, you can select virtual Machine software of your choice
b Deploy OWASP Juice Shop or Metasploitable on one Virtual Machine. This will be your target machine that you want to save and monitor.
Hint: You can select the vulnerable machine of your choice providing the reason for selection.
c Deploy your favorite IDSIPS in one Virtual Machine.
d A hacker virtual machine.
Test Scenarios:
a Select a range of attack scenarios minimum that represent common cybersecurity threats. These can include networkbased attacks, malware infections, phishing attempts, and application vulnerabilities.
b Prepare test cases that simulate these attack scenarios within the controlled environment. Select and configure your tools to detectprevent a set of threats that you are investigating.
Execution and Evaluation:
a Execute the test scenarios using each installed tool.
b Monitor and analyze the tool's performance in detecting and preventing the simulated attacks.
c Measure key metrics such as detection rates, false positive rates, response time, and resource consumption must be presented in form of a table in your report
d Document the results for each tool.
Strengths and Weaknesses Analysis:
Analyze the strengths and weaknesses of each tool based on the evaluation results. Identify areas where each tool excels and areas where improvements are needed. Consider factors such as accuracy, scalability, usability, flexibility, and support.
Documentation Points
Prepare a comprehensive report documenting the entire process as mentioned above, including tool installations, test scenarios, evaluation results, feature comparisons, and recommendations. You must have screenshots of the steps taken while installing and configuring the tools and virtual machines, along with the attack scenarios.
Presentation and Demonstration: Points
Present the project to a technical audience, explaining the methodology, results, and practical implications. You do not need to prepare any power point you must bring your machines and present it in class along with your group membermembers You need to demonstrate and run the simulations in a controlled manner. points for presentation and points for demonstration.
Important Note: Your project report will be checked for accuracy, similarity, and AI generated text must be less than
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started