Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis

08/25/2023
by   Kashif Ishaq, et al.
0

The security trade confidentiality, integrity and availability are the main pillar of the information systems as every organization emphasize of the security. From last few decades, digital data is the main asset for every digital or non-digital organization. The proliferation of easily accessible attack software on the internet has lowered the barrier for individuals without hacking skills to engage in malicious activities. An Industrial organization operates a server that (Confluence) serves as a learning platform for newly hired employees or Management training officers, thereby making it vulnerable to potential attacks using readily available internet-based software. To mitigate this risk, it is essential to implement a security system capable of detecting and preventing attacks, as well as conducting investigations. This research project aims to develop a comprehensive security system that can detect attack attempts, initiate preventive measures, and carry out investigations by analyzing attack logs. The study adopted a survey methodology and spanned a period of four months, from March 1, 2023, to June 31, 2023. The outcome of this research is a robust security system that effectively identifies attack attempts, blocks the attacker's IP address, and employs network forensic techniques for investigation purposes. The findings indicate that deploying Snort in IPS mode on PfSense enables the detection of attacks targeting e-learning servers, triggering automatic preventive measures such as IP address blocking. The alerts generated by Snort facilitate investigative actions through network forensics, allowing for accurate reporting on the detrimental effects of the attacks.

READ FULL TEXT

page 7

page 9

page 10

page 12

page 13

research
12/30/2019

ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System

Considering the attacks against industrial control system are mostly org...
research
01/02/2023

Honeypot Implementation in a Cloud Environment

In this age of digitalization, Internet services face more attacks than ...
research
09/14/2022

Collaborative SQL-injections detection system with machine learning

Data mining and information extraction from data is a field that has gai...
research
10/23/2019

The Security of IP-based Video Surveillance Systems

IP-based Surveillance systems protect industrial facilities, railways, g...
research
02/25/2022

Security Attacks and Solutions for Digital Twins

Digital twins, being the virtual replicas of their physical counterparts...
research
11/16/2021

Remote Memory-Deduplication Attacks

Memory utilization can be reduced by merging identical memory blocks int...
research
06/15/2020

ISMS role in the improvement of digital forensics related process in SOC's

Organizations concerned about digital or computer forensics capability w...

Please sign up or login with your details

Forgot password? Click here to reset