ELEMENTS OF NETWORK SECURITY’S PROJECT
Project Allotment: Each student will be allotted one project.
Time: 6 weeks
Report:
+ All report must fullil report’s template.
+ Individual project report: Formating with a standard template and not more
than 30 pages.
+ Individual project presentation: Design by Microsoft Powerpoint or other
tools.
Presentation:
+ Seminar Presentations: each student gives 10 minutes for presentation and 05
minutes for Q&A
+ Language of presentation: Vietnamese/English (Using English is encouraged)
+ Encouraging demostration
Project Evaluation Guidelines:
The project is to be evaluated based on the following parameters
+ Timeliness: 20%
+ Quality of Product/Service: 40%
+ Quality of presentation: 20%
+ Question & Answer: 20%
1
PROJECTs
Project 1: Introduction to VPN (Virtual Private Network) and implement
VPN Client to Site
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Cisco Packet Tracer/GNS3/EVE-NG; Windows; or Linux
Project 2: Introduction to VPN (Virtual Private Network) and implement
VPN Site to Site
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Cisco Packet Tracer/GNS3/EVE-NG; Windows; or Linux
Project 3: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source NAXSI
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
2
Project 4: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source WebKnight
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 5: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source Shadow Daemon
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 6: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source Coraza
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 7: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source OctopusWAF
Contents
+ Brief history
+ Technical overview
3
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 8: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source IronBee
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 9: Introduction to Web Application Firewall (WAF) and
Implement the WAF using open source ModSecurity
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Linux or Windows
Project 10: Introduction to IPSec
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Cisco Packet Tracer/GNS3/EVE-NG; Windows; or Linux
4
Project 11: Introduction to FTPS
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 12: Introduction to HTTPS
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 13: Introduction to DNSSEC
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 14: Introduction to VPN and Implement the Open Source
OpenVPN for Enterprise Network Systems
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
5
Project 15: Introduction to SSH
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux or Cisco Packet Tracer/GNS3/EVE-NG
Project 16: Introduction to VPN and Implement the SoftEther VPN
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 17: Introduction to VPN and Implement the OpenConnect VPN
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 18: Introduction to Firewall and Implement IPCop Firewall
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
6
Project 19: Introduction to Firewall and Implement pfSense Firewall
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 20: Introduction to Firewall and Implement OPNsense Firewall
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 21: Introduction to Firewall and Implement Smoothwall Firewall
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 22: Implement the Open Source network access control (NAC)
solution with PacketFence
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
7
Project 23: Implement the Intrusion Detection System (IDS) with Suricata
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 24: Implement the Intrusion Detection System (IDS) with Wazuh
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 25: Introduction to Firewall and Implement IPFire Firewall
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 26: Implement the Intrusion Detection System (IDS) with OSSEC
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
8
Project 27: Introduction to MD5 - Cryptographic Hash Function
Algorithm
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 28: Introduction to SHA - Cryptographic Hash Function
Algorithm
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 29: Introduction to DES - Symmetric-key Block Cipher
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
9
Project 30: Introduction to AES - Symmetric Block Cipher
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 31: Introduction to Triple Data Encryption Standard (TripleDES)
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 32: Introduction to Blowfish Encryption Algorithm
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 33: Introduction to Twofish Encryption Algorithm
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
10
Project 34: Introduction to HMAC Encryption Algorithm
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 35: Introduction to Cuckoo Sandbox - Open-source Automated
Malware Analysis System
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 36: Introduction to Security Onion - Intrusion Detection and
Network Security Monitoring Distribution
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
11
Project 37: Introduction to Kismet - Wireless Network Detector, Sniffer,
and Intrusion Detection System
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 38: Introduction to AlienVault OSSIM: Open-Source Security
Information and Event Management Platform
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 39: Introduction to Zeek (formerly Bro) - Network Analysis
Framework for Security Monitoring
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
12
Project 40: Introduction to ClamAV - Open-Source Antivirus Engine
Contents
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
Project 41: Introduction to Fail2Ban - Log-Parsing Application to Protect
Against Brute-Force Attacks
+ Brief history
+ Technical overview
+ Standards information
+ The use of this technology today
+ Demo //Windows or Linux
13
STANDARD TEMPLATE
DUY TAN UIVERSITY
INTERNATIONAL SCHOOL
***
ELEMENTS OF NETWORK SECURITY COURSE
INDIVIDUAL PROJECT REPORT
PROJECT NAME: [XXXXXXXXXXXXXXXXXXXXXXXXXXX]
STUDENT NAME:
STIDENT ID:
Submit date: [XXXXXXXXXX]
TABLE OF CONTENT
1. Project name ................................................................................................ Page X
2. Project goals ................................................................................................ Page X
3. References and main sources of information .............................................. Page X
4. Contents ....................................................................................................... Page X
4.1. Brief history .............................................................................................. Page X
4.2. Technical overview .................................................................................. Page X
4.3. Standards information .............................................................................. Page X
4.4. The use of this technology today .............................................................. Page X
5. Demostration .............................................................................................. Page X
6. Conclusion ................................................................................................... Page X
14