Find Jobs
Hire Freelancers

Analysis of Network Traffic using Intrusion Detection Systems

$30-250 USD

已关闭
已发布超过 1 年前

$30-250 USD

货到付款
Analysis of Network Traffic using Intrusion Detection Systems Intrusion Detection Systems (IDS) in general, are appliances that monitor a network or a computer system for intrusions [7]. The term intrusion detection, as used in IDS, can have different meanings: it might describe the detection of an actual intrusion, where an attacker illegitimately tries to gain access to a corporate network, but includes also the detection of malware and viruses or the enforcement of corporate policies (e.g., no sharing of pdf documents via e-mail). Depending on the system and the configuration, an IDS will trigger an alarm or event if it detects what it defines as an intrusion Traditionally, IDS are categorized according to the data they are analyzing: Hostbased Intrusion Detection Systems (HIDS) are placed on the host of interest and typically monitor Operating System (OS) operations and log files. NIDS can be put in two categories depending on the used detection method: • The first category are anomaly-based NIDS .They use behavior based techniques, implemented in Anomaly Detection Algorithms (ADAs) by defining a model of normal network behavior, and then detecting deviations to this model. The second category of NIDS are signature-based systems. They use a precise definition of known attacks and match bypassing network traffic against this definition. This implies that a database with definitions of observed attacks has been established in advance. Such attack definitions are called signatures or rules. In this project, you are required to build a test bed consisting of several virtual machines to simulate real networking environment. Attack traffic is captured and analyzed by open-source IDS (Snort, Suricata, Zeek) using both offline and in-line traffic analysis. You will implement and document the steps given in this project. You should submit your final report containing a description of the tasks you have done and the results of the analysis generated by the security systems. You are also required to include snapshots for every step you have conducted. you must expert in these tools: Virtual Box, Kali, Wireshark, Nmap, Metasploit, netcat, Snort, Suricata, Zeek deadline 12/2/2023
项目 ID: 35939417

关于此项目

18提案
远程项目
活跃1 年前

想赚点钱吗?

在Freelancer上竞价的好处

设定您的预算和时间范围
为您的工作获得报酬
简要概述您的提案
免费注册和竞标工作
18威客以平均价$165 USD来参与此工作竞价
用户头像
I am a Cisco expert with an experience up to 15 years as a senior network engineer in an enterprise level campus as a full-time senior network engineer, and in afternoon as a part-time Cisco instructor, which make from me have both the knowledge and experience to help you ,moreover I have a master degree in communication and electronics engineering so if you need help then you may drop me a message, thanks
$200 USD 在7天之内
4.6 (50条评论)
5.7
5.7
用户头像
Hello there, I can help u with this job plz contact and initiate the chat so that we can discuss in detail. I have great experience with Network Engineering, Linux, Hidden Wireless Network Detection, Network Security and Network Administration. Meanwhile here is my profile: https://www.freelancer.com/u/ayesha0124
$250 USD 在8天之内
5.0 (3条评论)
4.9
4.9
用户头像
I will help with your network intrusion analysis. I offer quality technical writing services and technical work help in the following niches: • Electrical & Telecommunications engineering. • Technical niches (ML, IoT, AI, Blockchain). • PYTHON & C++ Programming. • MATLAB programming. The range of work I can do for you include: • Thesis writing. • Dissertation writing. • Journal writing. • Research writing. • Report Writing. • Lab reports. My work is accompanied by: • Free LATEX typeset. • Free PLAGIARISM report. Hire me and let’s get started on your project!
$50 USD 在2天之内
5.0 (12条评论)
4.7
4.7
用户头像
Hello sir, I am a cybersecurity egineer and I am familiar with IDS and analysing network traffic. I did similar projects and I am familiar with the mentioned tools as well. I can handle this project as required. Please contact me to discuss more about this. Best regards
$140 USD 在2天之内
5.0 (6条评论)
3.6
3.6
用户头像
Hi there, How are you? I can work with your project requirements mentioned. I can definitely pull it off once provided with detailed file of your requirements. Some points are needed to be discussed before starting so lets talk. I have good experience in Analysis of Network Traffic using Intrusion Detection Systems including Network Administration, Hidden Wireless Network Detection, Linux, Network Security and Network Engineering. It would be great to have you on board and start it as quickly as possible. So it would be my pleasure to build long term relationship with you. All my skills are related to this particular project. Lets have a detailed chat about this project. Waiting from your end now. Thanks. Rashid Amjad.
$250 USD 在8天之内
5.0 (1条评论)
3.4
3.4
用户头像
Analysing Traffic in a network How are you today, hello? Michael here. I thoroughly read the summary of your intriguing project. With my wide range of skills, I can complete it with ease. I've successfully finished tasks like this in the past. I'd be happy to talk to you about the project. Send me a message Send: I'd be happy to share my solution(s) with you. Thanks
$200 USD 在4天之内
5.0 (1条评论)
1.7
1.7
用户头像
Hi, how are you? I go through the description and read it carefully, I know exactly what you are looking for. I have 5+ years’ experience in these skills Network Engineering, Network Administration, Network Security, Hidden Wireless Network Detection and Linux. I have some question about this job, Please start chat, so we have detail discussion about your task. Thanks! Umair
$250 USD 在6天之内
4.8 (2条评论)
1.9
1.9
用户头像
Hi how are you? I hope you are doing well. I am Network, Server, System, Security Engineer with over 13 years of professional experience. I possess various certifications HP Aruba, Cisco CCNP, Windows server, Windows 8, VoIP, Elastix, Issabel, Grandstream, 3CX and Watchguard. I have worked with both small and enterprise-sized companies to plan, design, implement and manage network and System Infrastructure.
$140 USD 在7天之内
5.0 (1条评论)
0.6
0.6
用户头像
Hi, Wadah A. I went through your project description and it seems like I am a great fit for this job. I am well skilled expert having great experience in Network Security, Network Administration, Network Engineering, Linux and Hidden Wireless Network Detection. We can chat more details with your requirements and my experience. And I am sure to provide an innovative result with my skills and experience. Please ping me to contact me. Stay safe
$155 USD 在5天之内
0.0 (0条评论)
0.0
0.0
用户头像
Hello there, Thanks for the job post,this is Joel Stewart from kenya, I have read your project description well and seems I am the best freelancer for this task for I an expert Network administration, network engineering, Linux, network security, hidden wireless network detection, HTML, Website development and software architecture and over 5+ years solid experience in freelancer online writing therefore very much confident I will hit your expectations on time and as per your budgets. Waiting to hear from you so we discuss in details, Thanks, Joel.
$200 USD 在5天之内
0.0 (0条评论)
0.0
0.0
用户头像
I have read the project description and I can complete this task within 2-3 days for you. I have experience in deploying siem, edr, ids, ips systems, so I can do this job well. I have 2 years of experience in systems and security. I currently hold a Certified Ethical Hacker (practical). I am currently in the top 1% in tryhackme with a rank of 3862. I know the following: - Security analysis - Vulnerability Assessment - Endpoint threat hunting - Cloud Security - Network and web pen-testing Some professional experience I did: - Implement elastic stack, Wazuh, Snort, Suricata, Open Distro, Nessus, openwaf - Investigate security features from the requirements to design and perform the security test cases. - Responsible for cyber security test case validation and issue tracking. - Audit baseline server, audit user. - Manage security system: Firewall, antivirus, NAC, WAF, anti-DDoS, SIEM. - Control and handle all information security tickets SOC tier 1,2. - Ensure users fully install information security solutions. - Perform Vulnerability Assessment of internal web systems. - Threat-hunting endpoint devices. - Perform a CIS benchmark for Azure resources. - Implementing and in charge of services: Apache web server, Database, DNS, WordPress with AWS. - Implementing, managing, and monitoring bandwidth, traffic, and hardware resources via Zabbix and Cacti. - Perform load testing with JMeter releasing the product.
$210 USD 在3天之内
0.0 (0条评论)
0.0
0.0
用户头像
I went through your project description and being a forensics freak i am fit for this project. I am well skilled expert having great experience in Network Security, Network Administration, Network Engineering, Linux and Hidden Wireless Network Detection. We can chat more details with your requirements and my experience. And I am sure to provide an innovative result with my skills and experience. Please ping me to contact me.
$100 USD 在7天之内
0.0 (0条评论)
0.0
0.0
用户头像
I learn fast And I do. I have mastered Linux and its tools. also I have 16 years of work experience.
$100 USD 在7天之内
0.0 (0条评论)
0.0
0.0
用户头像
Hello, I am here to work with you for your special project with my 10 years of computer security Ethical Hacker experience.
$140 USD 在2天之内
0.0 (0条评论)
0.0
0.0
用户头像
My knowledge
$249 USD 在7天之内
0.0 (0条评论)
0.0
0.0
用户头像
i can scan the network for vulnerabilities and create reports for that i can also write automated scripts in python to do so
$50 USD 在7天之内
0.0 (0条评论)
0.0
0.0

关于客户

YEMEN的国旗
Sanaa, Yemen
5.0
4
付款方式已验证
会员自11月 10, 2021起

客户认证

谢谢!我们已通过电子邮件向您发送了索取免费积分的链接。
发送电子邮件时出现问题。请再试一次。
已注册用户 发布工作总数
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
加载预览
授予地理位置权限。
您的登录会话已过期而且您已经登出,请再次登录。