It will require deploying two virtual machines using Ubuntu as it's an operating system as shown in the attachment. One serving as a firewall and the other serving as a Honeypot. The firewall VM also integrates intrusion detection capabilities, therefore, in addition to filtering network traffic, it should alert any potential intrusion. On the Firewall VM configure the firewall using iptables to ensure security of the internal network and also to enable functionality of the honeypot securely. The Firewall VM is also use to install and configure snort to function as an IDS for the network. The snort IDS should be configure beyond the default rules to ensure it is useful for securing Honeypot and Firewall.
11 freelances font une offre moyenne de 237 $ pour ce travail
Hello, i can do this project Implement network security countermeasure to secure Honeypot into a network environment. contact me after have a look into my profile. profile : https://www.freelancer.com/u/mubashirabbas07 Plus
Dear I have vast experience in System technologies please let me know if you require my services May you get some low ball bids let me know if you still finding to complete the project in request timelines.
Good Day, I have gone through your requirement and I can complete the project smoothly. I am having 15+ Years of Industry experience/exposure. My core exposure includes planning, design & implement highly sophisticate Plus
i am software engineer and i have a largests experiences on other fields as networking and navigation (surfing) ..
10 years of experience in experience in field of Network Security worked as NOC Engineer in Alcatel Lucent and Security Expert in Airtel -Extensive knowledge of hardware, software and networking skills -Manage and con Plus
Hi This is Chakravarthi , I'm ccnp certified and have working experience 10 year in this routing , switching linux filed
I have configured and secured thousands of servers during my experience in ELIT Sonelgaz, configured multiple ACLS and used Mcfee SIEM to monitor the traffic, this is a piece of cake for me, (snort config might take s Plus
I have experience with both Red Team and Blue Team. I am currently working on the security Mechanisms for an architecture which also includes HoneyPots, Firewalls, Scripting, YARA Rules with Hardware and Virtualization Plus