Professional Documents
Culture Documents
On
Network Infrastructure of a Company
Submitted in Partial Fulfillment of the Requirements
Signature:
Name:
Roll No.:
Date:
Attach Certificate here issued by the company for your
industrial training
ACKNOWLEDGEMENT
Signature:
Name:
Roll No.:
Date:
ABSTRACT
Since that time the proliferation of computers and computer networks has
increased significantly. One of the most significant challenges to networks is
attacks on their resources caused by inadequate network security. The purpose
of this research project was to evaluate open source, free, intrusion detection
systems and how easily they can integrate into an existing network. Research
was conducted for this study through a review of existing literature pertaining
to intrusion detection systems and how they function. The literature also
highlighted previous studies conducted on intrusion detection systems, both
commercial and open source. In addition to the review of existing literature,
the author conducted independent testing on three open source intrusion
detection systems.
The open source programs, Snort, OSSEC, and Prelude, were selected due to
being highly rated in professional publications. The author created a secure
simulated computer network, to ensure that each of the programs was tested in
a controlled and equitable manner. The findings of this study determined that
the three open source intrusion detection systems tested are as capable as
commercial programs in securing a computer network.
TABLEOFCONTENTS
Page
DECLARATION ................................................................................................... ii
CERTIFICATE ISSUED BY THE COMPANY ................................................... iii
ACKNOWLEDGEMENTS.................................................................................. iv
ABSTRACT ........................................................................................................... v
LIST OF ABBREVIATIONS ................................................................................ ix
CHAPTER 1: INTRODUCTION OF THE COMPANY............................................... 1
1.1. ................................................................................................................. 3
1.2. ................................................................................................................. 5
CHAPTER 2: PROBLEM STATEMENT AND OBJECTIVE.................... 7
2.1. ................................................................................................................. 8
2.2. ................................................................................................................. 10
CHAPTER 3: LITRATURE SURVEY ………………………………………… 17
3.1 ………………………………………………………………………..
3.2 ………………………………………………………………………
CHAPTER 4:METHODOLOGY AND TECHNOLOGY ................................... .
4.1. ................................................................................................................ 19
4.2. ................................................................................................................ 20
CHAPTER 5:RESULT ANALYSIS AND DISCUSSION .................................. 24
5.1. ................................................................................................................ 25
5.2. ................................................................................................................ 27
CHAPTER 6:CONCLUSIONS AND FUTURE WORK ................................. 30
6.1. ................................................................................................................ 36
6.2. ................................................................................................................ 37
REFERENCES... .................................................................................................... 38
LIST OF FIGURES
S. No Abbreviations Description
1 DNS Domain Name Server
2 DHCP Dynamic Host Control Protocol
3 IPv4 Internet Protocol Version 4
4 NFS Network File Sharing
5 POP Post Office Protocol
CHAPTER -1
Introduction of the Company
Bought the following items to start your Company and plan to inaugurate the portal
by 9am 1st July 2019.
a) Rented a space to use it as office and keep your servers
b) 3 Red Hat Linux Enterprise server. With plenty of memory and stoage space
c) 3 live IP address
d) 32Mbps internet connection from reliance
e) A domain name as netcamp.in
CHAPTER -3
Literature Survey
Computer Networks
A Local Area Network (LAN) and Wide Area Network (WAN) are two types of
computer networks. A LAN is a network that is confined to a relatively small area,
generally limited to a geographic area such as an office building, school or home. A
WAN connects smaller LAN networks together, such as a company’s headquarters in
New York City to a remote office in Florida. A network facilitates electronic
communication, file sharing or calibration, such as a video conference.
Network Vulnerabilities
The average time a new system, which is un-patched and un-defended, can be
connected to the Internet before it is attacked is approximately twenty to thirty
minutes, yet more than thirty percent of those polled by the National Cyber Security
Alliance (NCSA) think they will be struck by a bolt of lightning before they see their
computers violated in an Internet attack. In 2004, the computer worm My Doom was
released. 9
CHAPTER -4
Methodology and Technology
Create one web server which will host all the web sites for the Company
(netcamp.in)
Create one DNS server .
Create one mailing server which will provide the email service for the
Institution / Company (mail.netcamp.in – and should be able to access
from web). Mail server should have POP3 support so user can download
email in their own laptop/desktop. (Please customize the mail page with
your own company logo and company name)
The mail server will be the file server which will have file storage space
for the user.
File server will also have a dhcp server (range of ips =192.168.1.150 to
192.168.1.190 gateway=192.168.1.1 and dns server = give your dns
server) so that it can give ip address to all client machines.
You were 4/5 in your group you decided that you will be the Chairman
of the company and will have access to all the files / folders in your
company. You created three departments – Sales, RandD and Accounts.
Please divide the group members in all these groups. For the file
management you decided about the following points.
sales.company.in
research.company.in
accounts.company.in
mail.company.in
Common data folder for user (only departmental access – only the
department people can read and write on the same)(samba share)
/departmentname/data
/departmentname/driver
Please make a note, chairman will have full access on these folder called
data and driver (samba share);
You should also view others domain and send mail to them Please design
and implement the same.
Please note Reliance will give the public ip address only after a week so,
all job has to be done with private ip address only for the same.
Firewall: Please use firewall in your server make sure that telnet, ftp
and ssh is not allowed from outside the network (allow only to your
group members ip only)
CHAPTER -6
Conclusions and Future Work
Networks have taken a significant number of major twists and turns since they began
to gain popularity in the early 1980s, with an amazing range of basic technologies,
protocols and configurations developed and deployed. With today's mobile-centric
wireless LANs now dominating the edge of the network, it seems a safe bet that Wi-
Fi will remain the preferred access for essentially all users, but underpinned by wired
Ethernet for backhaul and interconnect.
Wave 2 of IEEE 802.11ac- which has gained significant traction, will be a bit
long in the tooth in 2025, but it will still be in use -- not completely replaced by
802.11ax and its 10 Gbps of throughput. Wi-Fi will continue to dominate access. No
surprises there. But we did notice a few other interesting trends as we mull the future
of networking, including:
Routers live on -- sort of. The term router is increasingly inappropriate, as the
genesis of the router was in multiprotocol infrastructure elements supporting more
than one physical layer. Today's routers are really degenerate Layer 3 switches, with
additional security and management capabilities. They are really more of a WAN
access device than a router and, again, transparent in operation. Carrier-grade routers
remain, of course, but the enterprise router of 2025 also becomes transparent.
4D
The 4D Network is an attempt to eliminate the need for Internet Protocol that we
know today. Internet Protocol is an old system that has some vulnerability and
inefficiency as more applications are added to it. A 4D Network would restructure
how packets of information are handled by following the 4 network planes:
https://study-ccna.com.
https://www.stackoverflow.com.
https://www.github.com.
https://www.linux.org.
https://opensource.com/article/18/7/sysadmin-guide-networking-commands
Peterson, L. L. and Davie, B. S. (1996) Computer Networks: A Systems
Approach, Morgan Kaufmann.