Hi
I am looking for someone to help me in the following coursework.
A company (JoeNapier plc) has created a new Web infrastructure built around a
Linux Web core. It runs a number of services, and the aim of the assignment is to
perform an assessment for their Web system, and implement an outline intrusion
detection system to overcome the threats that they are worried about. The key tasks
are thus:
 Perform an evaluation of the key services within their infrastructure.
 Develop and implement a strategy to detect the network scanning of their
system.
 Develop and implement a strategy to detect activities which involves the login
of an administrator through Telnet or FTP.
 Develop and implement a strategy to detect a malicious Bot agent (to be
given).
Do not perform these activities on any address space apart from with the
Napier Cloud or on your own VM private network.
The aim is to create a prototype of a system which outlines how the system works.
You should implement an agent-based system based on the requirments listed
above, either using: your own agent (using Winpcap and .NET or Java); a standalone version of Snort; or using a graphical management system which interfaces to
Snort (a mixture of Snort, Winpcap and .NET). Overall the alerts should be useful,
and, possibly, stored in a secure manner.
The Bot code can be downloaded from:
[login to view URL]
Note: that the Bot code is not malicious in any way.
Marking schedule
Coursework will be marked as follows:
Introduction
This should be a summary of the problem definition, research scope, aims and the
structure and main content of the report.
Requirements Analysis and Design
This should show the analysis related to the main requirements both theory and
practice, and an outline of the proposed system, with the main design features.
Outline implementation
This should define an outline implementation of the IDS, which demonstrates the key
implementation elements of the proposed IDS Sensor. You should provide Snort
rules and their description with justification of the rules’ components.
Test and Evaluation
This should outline the results of the testing performed on the system that shows the
precision and effectiveness of your solution in terms of detecting unwanted traffic.
You should also provide evaluation of the system as a whole with possible scope for
improvements.
Conclusions
This should reflect the main findings and methods you have used in the system.
Assess strengths and weaknesses of your work, and any observations that you have
gained. Also include possible future enhancements to the system.
References/Presentation
All references must be defined in an APA/Harvard format, and should be cited
throughout the report.
The report should use the APA/Harvard format for all of the references, and, if
possible, should include EVERY reference to material sourced from other places.
Please remember that this is not a report in which “cut-and-paste” from the web is
either sufficient of useful. It must be in YOUR words and opinion is YOUR
PERSONAL REFLECTION on the topic, based and supported by the references
used.
The report
 The report has to be written in third person.
 The report should be in 12 point text with normal margins.
 It must be typed (not handwritten) in English.
 It must be submitted on paper by the date shown above in person to the
school office. You must have your matriculation card to submit the work.
 It must be completely your own work.
 There are no extensions available for this coursework.
 The document should clearly indicate how many pages there are in total.
 All pages should be numbered.
Thanks for watching and bidding,