Question: Objective: The objective of this project is to install and run virtual machines with various IPS / IDS tools, evaluate their effectiveness, and compare their

Objective: The objective of this project is to install and run virtual machines with various IPS/IDS tools, evaluate their effectiveness, and compare their features and functionalities. Students will need to make a group of 2 or 3 students to do the following:
Test Environment Setup:
Set up a controlled test environment with a minimum of 2 virtual machines in isolated network segments. It's recommended to ensure that the environment mimics a real-world scenario by including various operating systems (one of them must be Kali Linux), network configurations, and security configurations.
You can do whatever scenario you like but it is recommended to do the following at least:
a. You must install and configure your virtual machines.
Hint: For windows users can go with VirtualBox and for Mac users can go with parallels Desktop. (If you want as a group, you can select virtual Machine software of your choice)
b. Deploy OWASP Juice Shop or Metasploitable on one Virtual Machine. This will be your target machine that you want to save and monitor.
Hint: You can select the vulnerable machine of your choice providing the reason for selection.
c. Deploy your favorite IDS/IPS in one Virtual Machine.
d. A hacker virtual machine.
Test Scenarios:
a. Select a range of attack scenarios (minimum 3) that represent common cybersecurity threats. These can include network-based attacks, malware infections, phishing attempts, and application vulnerabilities.
b. Prepare test cases that simulate these attack scenarios within the controlled environment. Select and configure your tools to detect/prevent a set of threats that you are investigating.
Execution and Evaluation:
a. Execute the test scenarios using each installed tool.
b. Monitor and analyze the tool's performance in detecting and preventing the simulated attacks.
c. Measure key metrics such as detection rates, false positive rates, response time, and resource consumption (must be presented in form of a table in your report)
d. Document the results for each tool. note plesee send answer with screenshot of every step solved and how it
 Objective: The objective of this project is to install and run

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!