190 likes | 340 Views
Using CLIPS to Detect Network Intrusions - (CLIPNIDS) Phase I MSE Project Sripriya Marry Committee Members Dr. David Gustafson (Major Professor) Dr. Rodney Howell Dr. Mitchell Nielsen. Overview. Problem Statement Purpose and Motivation Background Project phases Project Requirements
E N D
Using CLIPS to Detect Network Intrusions - (CLIPNIDS)Phase IMSE ProjectSripriya MarryCommittee MembersDr. David Gustafson (Major Professor)Dr. Rodney Howell Dr. Mitchell Nielsen
Overview • Problem Statement • Purpose and Motivation • Background • Project phases • Project Requirements • User Interface • Cost Estimation • Effort Distribution
Problem Statement Objective To update Clipnids with the signatures of latest network attacks so as to detect and notify network administrators about any unauthorized access to the network resources by intruders
Purpose and Motivation • To excel in the Linux, C and GNU Programming. • Inspired by SNORT.
Background • Intrusion detection: Process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusion. • Types of Intrusion Detection Systems: • Network-based IDS • Host-based IDS • Application-Based IDS
Types of Analysis: • Misuse Detection • Anomaly Detection • Types of Response: • Passive measure • Active measure • Conclusion: CLIPNIDS is Network-based IDS, that uses “Misuse Detection” analysis technique for detecting intrusions and uses “Passive Measure” to Respond to intrusions.
Project phases • Inception Phase. • Elaboration Phase. • Production Phase
InceptionPhase • Vision Document 1.0 • Project Plan 1.0 • Software Quality Assurance Plan • Prototype
Project Requirements • Actors identified for Clipnids. • Use-Case diagram. • Tasks required to achieve the objective of the project.
Actors identified for Clipnids. • Network • Clipnids • System Administrator
Tasks required to achieve the objective of the project. • Strong knowledge of Linux, C, GNU Programming and Bash scripting language. • Strong knowledge of GDB tool for debugging. • Migration of source code of CLIPNIDS from PCAP to DAQ to capture packets.
Integrating of latest versions of decoders and pre-processors from SNORT into CLIPNIDS • Identifying the version of SNORT using which CLIPNIDS decoder and pre-processors were built. • Possessing the latest version of SNORT. • Good understanding of working of expert-system CLIPS. • Good understanding of working of CLIPNIDS and its architecture. • Good understanding of working of SNORT and its architecture.
Modifying of “conf.clp” file to alter configuration settings for CLIPNIDS based on the latest pre-processors. • Adding new CLIPS files to incorporate the latest signatures of intrusions into pattern database of CLIPNIDS.
Cost Estimation • COCOMO Model is used as cost estimation for CLIPNIDS Effort = C1 * EAF * (Size)P1 Time = C2 * (Effort)P2 Organic Mode • C1= 3.2 • C2= 2.5 • P1= 1.05 • P2= 0.38