This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Intelligent Intrusion Detection System"
Hblankenship (talk | contribs) (Created page with "<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">link=</div> {| style="padding: 0;margin:0;margin-top:10px;text-alig...") |
SriHarshaG97 (talk | contribs) m |
||
| (3 intermediate revisions by 2 users not shown) | |||
| Line 4: | Line 4: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | + | ==OWASP Tool Project== | |
| + | |||
==Description== | ==Description== | ||
| − | |||
| − | |||
| − | |||
| − | + | ===Problem=== | |
| + | In today's world, Network and System Security are of paramount importance in the digital communication environment. On par with the developments in technology, many threats have emerged for information security which has worse effects when it comes to sensitive transactions. Nowadays, intruders can easily break the walls of the network and can cause many kinds of breaches such as the crash of the networks, Denial Of Service, injecting Malware and so on. In order to avoid those breaches, it is badly needed for a security administrator to detect the intruder and prevent him from entering into the network. In daily life, new threats and associated solutions are emerging together. | ||
| − | + | ===Proposed Solution=== | |
| + | A Hybrid Intrusion Detection System by leveraging the benefits of Machine Learning techniques to build a system which detects the intrusion and alerts the respective network administrator. This can be extended from Intrusion to breach detection as well. The developed system analyses and predicts the behavior of users which in turn classifies as an anomaly or a normal behavior. | ||
| − | + | ===Use Case Scenarios=== | |
| + | |||
| + | * Denial of Service (DoS): Attacker tries to prevent legitimate users from using a service. | ||
| + | * Probe: Attacker tries to gain information about the target host. | ||
| + | * U2R: Attacker has local access to the victim machine and tries to gain super user privileges. | ||
| + | * R2L: Attacker does not have an account on the victim machine, hence tries to gain access. | ||
==Licensing== | ==Licensing== | ||
| − | |||
| − | |||
| − | |||
| − | + | ||
| + | OWASP Hybrid Intrusion Detection System is free to use. It is licensed under GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project) | ||
==Roadmap== | ==Roadmap== | ||
| − | + | ||
| − | |||
<strong> | <strong> | ||
* Complete the first draft of the Tool Project Template | * Complete the first draft of the Tool Project Template | ||
| − | * Get | + | * Get more contributors to the project |
| − | * | + | * Push the project base to github repository |
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project | * Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project | ||
</strong> | </strong> | ||
| − | + | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
==Getting Involved== | ==Getting Involved== | ||
| − | + | Feel free to contact the [mailto:[email protected] leader] to know how can you be part project growth. | |
| − | + | ||
| − | |||
| − | |||
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
== Project Resources == | == Project Resources == | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | [https://github.com/ | + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ Installation Package] |
| − | [https://github.com/ | + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ Source Code] |
| − | [https://github.com/ | + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ What's New (Revision History)] |
| − | [https://github.com/ | + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ Documentation] |
| − | [https:// | + | [https://www.owasp.org/index.php/OWASP_Intelligent_Intrusion_Detection_System Wiki Home Page] |
| − | [https://github.com/ | + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ Issue Tracker] |
| − | [https://github.com/ | + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ Slide Presentation] |
| + | |||
| + | [https://github.com/OWASP/Intelligent-Intrusion-Detection-System/ Video] | ||
== Project Leader == | == Project Leader == | ||
| − | |||
| − | |||
| − | |||
| − | Sri Harsha Gajavalli | + | [mailto:[email protected] Sri Harsha Gajavalli] |
| + | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
==Classifications== | ==Classifications== | ||
Latest revision as of 17:23, 22 February 2019
|
OWASP Tool ProjectDescriptionProblemIn today's world, Network and System Security are of paramount importance in the digital communication environment. On par with the developments in technology, many threats have emerged for information security which has worse effects when it comes to sensitive transactions. Nowadays, intruders can easily break the walls of the network and can cause many kinds of breaches such as the crash of the networks, Denial Of Service, injecting Malware and so on. In order to avoid those breaches, it is badly needed for a security administrator to detect the intruder and prevent him from entering into the network. In daily life, new threats and associated solutions are emerging together. Proposed SolutionA Hybrid Intrusion Detection System by leveraging the benefits of Machine Learning techniques to build a system which detects the intrusion and alerts the respective network administrator. This can be extended from Intrusion to breach detection as well. The developed system analyses and predicts the behavior of users which in turn classifies as an anomaly or a normal behavior. Use Case Scenarios
LicensingOWASP Hybrid Intrusion Detection System is free to use. It is licensed under GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project) Roadmap
Getting InvolvedFeel free to contact the leader to know how can you be part project growth.
|
Project ResourcesProject Leader
Classifications
| ||||||



