Help with security and forensic coursework


I am looking for someone to help me in the following coursework.

A company (JoeNapier plc) has created a new Web infrastructure built around a

Linux Web core. It runs a number of services, and the aim of the assignment is to

perform an assessment for their Web system, and implement an outline intrusion

detection system to overcome the threats that they are worried about. The key tasks

are thus:

 Perform an evaluation of the key services within their infrastructure.

 Develop and implement a strategy to detect the network scanning of their


 Develop and implement a strategy to detect activities which involves the login

of an administrator through Telnet or FTP.

 Develop and implement a strategy to detect a malicious Bot agent (to be


Do not perform these activities on any address space apart from with the

Napier Cloud or on your own VM private network.

The aim is to create a prototype of a system which outlines how the system works.

You should implement an agent-based system based on the requirments listed

above, either using: your own agent (using Winpcap and .NET or Java); a standalone version of Snort; or using a graphical management system which interfaces to

Snort (a mixture of Snort, Winpcap and .NET). Overall the alerts should be useful,

and, possibly, stored in a secure manner.

The Bot code can be downloaded from:

[url removed, login to view]

Note: that the Bot code is not malicious in any way.

Marking schedule

Coursework will be marked as follows:


This should be a summary of the problem definition, research scope, aims and the

structure and main content of the report.

Requirements Analysis and Design

This should show the analysis related to the main requirements both theory and

practice, and an outline of the proposed system, with the main design features.

Outline implementation

This should define an outline implementation of the IDS, which demonstrates the key

implementation elements of the proposed IDS Sensor. You should provide Snort

rules and their description with justification of the rules’ components.

Test and Evaluation

This should outline the results of the testing performed on the system that shows the

precision and effectiveness of your solution in terms of detecting unwanted traffic.

You should also provide evaluation of the system as a whole with possible scope for



This should reflect the main findings and methods you have used in the system.

Assess strengths and weaknesses of your work, and any observations that you have

gained. Also include possible future enhancements to the system.


All references must be defined in an APA/Harvard format, and should be cited

throughout the report.

The report should use the APA/Harvard format for all of the references, and, if

possible, should include EVERY reference to material sourced from other places.

Please remember that this is not a report in which “cut-and-paste” from the web is

either sufficient of useful. It must be in YOUR words and opinion is YOUR

PERSONAL REFLECTION on the topic, based and supported by the references


The report

 The report has to be written in third person.

 The report should be in 12 point text with normal margins.

 It must be typed (not handwritten) in English.

 It must be submitted on paper by the date shown above in person to the

school office. You must have your matriculation card to submit the work.

 It must be completely your own work.

 There are no extensions available for this coursework.

 The document should clearly indicate how many pages there are in total.

 All pages should be numbered.

Thanks for watching and bidding,

Skills: Computer Security, Web Security

See more: develop implement strategy detect network scanning, network security coursework help, web security coursework, perform evaluation key services within infrastructure, web plc, web design from outline, web design assignment help, web design assessment, web analysis services, weaknesses and strengths, weaknesses, vm management, the assignment problem, system sensor, submit prototype, strengths and weaknesses, strengths, solution to assignment problem, solution of assignment problem, security administrator, schedule agent, research design methods, research design definition, prototype reference, prototype help

About the Employer:
( 1 review ) edinburgh, United Kingdom

Project ID: #1292807

1 freelancer is bidding on average $100 for this job


We are software security expert with experienced security professionals. Contact me to get quality work. Regards

$100 USD in 5 days
(0 Reviews)