SMB Global Ips Notification Via Webmin
SMB Global Ips Notification Via Webmin
SMB Global Ips Notification Via Webmin
VIA WEBMIN
52261212242
SEPTEMBER 2015
DECLARATION
I declare that this report is my original work all references have been cited
adequately as required by the University.
Date: 31/12/2015
Signature
Full Name: MUHAMMAD FIKRI BIN
A. HAMID
ID Number: 52261212242
APPROVAL PAGE
We have supervised and examined this report and verify that it meets the
program and Universitys requirement for the Bachelor of Information
Technology (HONS) in Computer System Security
Date: 31/12/2015
Signature:
Supervisor: Madam Herny
Ramadhani binti
Mohd. Husny
Official Stamp:
Date: 31/12/2015
Signature:
Accessors: Sir Han Lock Siew
Official Stamp:
ACKNOWLEDGEMENT
In the name of Allah, The Most Gracious, The Most Merciful, and Him alone are
worthy of all praise.
It is not possible for me to acknowledge individually the debt that I owe to
who had made their contribution in preparing and writing this research project
proposal. I would like to thank many people who helped me.
Special thank go to my supervisor, Madam Herny Ramadhani bt Mohd
Husny Hamid, Sir Han Lock Siew and Madam Yuhanis for her wonderful
support, guidance and cooperation that had been given to me through the
compilation of this project. I would also express my gratitude to Madam Hazimah
who had been guiding the writing of this report from the beginning.
I would like to thank my family and my friends for their deepest concern
and investment during the course of this project. All of you are my strength and
thank for everything.
I would like to extend my sincere thanks to my fellow classmates and
housemates, dedicated network lecture and BCSS lectures and the others for
contributing and supporting me directly and indirectly.
Thank you, may Allah SWT bless all of you.
LIST OF TABLES
Table 2.1 Comparison between Current IPS vs New Proposed IPS....25
Table 3.1 Hardware Requirement...42
Table 3.2 Software Requirement....43
Table 4.1 : Software Requirement...
45
Table
4.2:
Hardware
Requirement...
...46
Table
5.1:
Display
SQL
Injection
test..66
Table
5.2:
Display
Cross-Site
Scripting
test...67
Table 5.2: Webmin display test...68
LIST OF FIGURES
Figure
1.1
Current
IPS.
..............3
Figure 2.1: Type of Attacks by layer............8
Figure 2.2: Anatomy of Web Attack Process .........9
Figure 2.3: SQL Injection Process......11
Figure 2.4: IPS Architecture.
....15
Figure
2.5:
Example
of
Signature
based....16
Figure 2.6: Example of Rule Base........
..17
Figure
2.7:
Firewall
Process.....
.......18
Figure
2.8:
Airsnare
Intrusion
Detection
System.
Intrusion
Detection
System.
.....20
Figure
2.9:
Airsnare
.........21
Figure 2.10: Airsnare Intrusion Detection System ..
.....22
Figure
3.1:
Rapid
Application
Development
(RAD)
.................28
Figure 3.2: Penetration Testing using Burp suite.....36
Figure
3.3:
Schools
website...
.37
Figure 3.4: System Diagram on How the System Works ..
.38
Figure 3.5: Flow chart...39
Figure
3.7:
Proposed
project
sketches.......................................40
Figure
3.8:
Proposed
project
sketches................................41
Figure 4.1: Schools website
47
Figure 4.2: Virtual Private Server...
.48
Figure
4.3
Web
Application
Firewall
(WAF)
.49
Figure
4.4:
Flow
chart
..
....50
Figure 4.5: Command Installation Voyage Debian Process...51
Figure
4.6:
Command
ModSecurity/Apache
2..
....52
Figure 4.7: Create and Modified Base Rules...
.53
Figure 4.8: Reverse Proxy Architecture on IPS ..
.60
Figure
4.9:
Webmin..
.62
LIST OF FIGURES
10
ABSTRACT
This project is aimed to have an Intrusion Prevention System notification via
Webmin in the real time in order to detect and prevent all SQL injection and
Cross-Site Scripting attacks. It is one of the good solutions for improving
network security to integrate many kinds of security techniques. Firewall and
intrusion detection system can enforce security of the network effectively, but
there are also drawbacks existing in themselves. Intrusion prevention system
(IPS) is a technique combining the techniques of the firewall with that of the IDS
properly. This project have three objective to achieve, in order to achieve the
project goals, developer should be study the process or methods of IPS, create
new basic rules for IPS and to test embedded webmin from IPS notification. A
typical usage of a reverse proxy is to provide Internet users access to a server
that is behind a firewall. Reverse proxies can also be used to balance load
among several back-end servers or to provide caching for a slower back-end
server. SMB IPS will be apply on schools website and developer used Burp
Suite to test the functionality of this IPS. Once attacker inject the website, IPS
will be notification via webmin to show the real time to detect and block the
intrusion. In conclusion, this is the best methods to improve the security of the
website from web attacks.
11
12
CONTENT
DECLARATION...................................................................................................iii
APPROVAL PAGE....iv
ACKNOWLEDGEMENT....v
LIST OF TABLES...
vi
LIST
OF
FIGURES...
..vi
ABSTRACT...vii
CHAPTER 1: INTRODUCTION
1.1
Introduction....
.....1
1.2 Project Background.......2-3
1.3 Problem statement.3-4
1.3.1
Application
layer
attacks
are
increase
..3
1.3.2
Current
IPS
not
very
efficiency
...........................4
1.4 Problem Solving..
...4
1.4.1
Produce
IPS
and
used
reverse
proxy
methods...4
1.4.2 Create updated rules and new signature of attacks ..
.4
1.5 Objectives...5
1.6 Project Scope......56
13
Project
Significant......7
1.8 Conclusion......7
14
Introduction
of
Literature
Review.....................................8
2.2 Web attack.812
2.2.1 Anatomy of web attack..910
2.2.2 Type of web attack...1012
2.2.2.1 SQL injection...11
2.2.2.2
Cross-site
scripting.....12
2.3 Method to protect from Web Attack.....1214
2.3.1 Firewall...13
2.3.2 Anti-virus....13
2.3.3 Intrusion Prevention System.....
..14
2.4 Information of Intrusion Prevention System....1519
2.4.1
Technique
that
be
used
on
IPS.......15
2.4.2 IPS Methods to Detect and Prevent Attacks ..1618
2.4.3 Advantages using IPS..19
2.5 Type of Current IPS...20-22
2.5.1 Airsnare......20
2.5.2 Metaflow Management Application....21
15
Virtual
Private
Prevention
System
Server.24
2.7
Comparison
of
Different
Intrusion
..........25
2.8 Conclusion......................26
16
CHAPTER 3: METHODOLOGY
3.1
Introduction....
...27
3.2 Rapid Application Development......27-37
3.2.1 Phase 1: Analysis Design and Quick Design .....2932
3.2.2 Phase 2: Development (Build, Demonstrate and Refin..3335
3.2.3 Phase 3: Testing ......36
3.2.4 Phase 4: Implementation and release.
...37
3.3 System Architecture.
38
3.4 Flow chart.....39
3.5 Proposed project sketches.......4041
3.6 Budget / Cost Estimation...4243
3.6.1 Hardware Requirement....
42
3.6.2 Software Requirement.....43
3.7 Conclusion....43
17
Introduction....
...44
4.2
Overview
of
Product
Development
..
.....44
4.3 System Requirement ....4146
4.4 New proposed SMB IPS.............................4649
4.4.1 System Module Structure.
46
4.4.1.1 Web Client.....
..47
4.4.1.2 Virtual Private Server.48
19
20
Conclusion..
...75
REFRENCES...76-79
APPENDICE A: Questionnaire...................80
APPENDIX B: Gantt Chart8183
21