Skip to content

o-mdonyelwa/Secure-Network-IDS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

🔒 Secure Network & IDS Virtual Lab

The Secure Network & IDS Virtual Lab is a simulated cybersecurity environment that demonstrates various network threats and defensive measures. This virtual lab includes simulations for DDoS attacks and ARP spoofing within a robust mesh network topology. It features an internal DNS setup, comprehensive traffic logging, and a real-time intrusion detection system (IDS) using industry-standard tools like Wireshark and Snort.


📌 Overview

In today's networked world, understanding and mitigating cybersecurity threats is critical. This project sets up a controlled virtual lab where:

  • Simulated Cyber Threats: You can observe the behavior of attacks such as Distributed Denial-of-Service (DDoS) and ARP spoofing.
  • Mesh Network Topology: A complex network design that mimics real-world environments with redundant paths and interconnected nodes.
  • Internal DNS: Provides name resolution within the lab while isolating external influences.
  • Traffic Logging: Captures network data to analyze attack signatures and patterns.
  • Intrusion Detection System (IDS): Utilizes Wireshark for packet capture and Snort for real-time threat detection, offering hands-on insights into network security monitoring.

📊 Key Features

  • Cybersecurity Threat Simulation

    • DDoS Attack Simulation: Replicate massive network traffic floods to understand impact and mitigation strategies.
    • ARP Spoofing Simulation: Demonstrates how attackers can intercept or manipulate network traffic.
  • Secure Mesh Network Architecture

    • A resilient network topology designed with redundancy and multiple interconnected nodes.
    • Internal DNS for secure name resolution and network segmentation.
  • Traffic Analysis and Logging

    • Detailed logging of network packets for post-event analysis.
    • Real-time monitoring to capture suspicious patterns and anomalies.
  • Intrusion Detection System (IDS) Implementation

    • Wireshark: For deep packet inspection and visual analysis.
    • Snort: For real-time threat detection, alerting, and block actions based on pre-configured rules.

🛠️ Technologies & Tools

  • Operating System: Linux (or any Unix-based system recommended for network simulations)
  • Network Simulation: Tools like GNS3 or VirtualBox for creating virtual labs
  • Packet Analysis: Wireshark for packet capturing and analysis
  • Intrusion Detection: Snort for detecting and alerting on suspicious activity
  • DNS Services: BIND or dnsmasq for the internal DNS server
  • Scripting & Automation: Bash, Python, or other automation tools for simulating attacks and managing lab environments

🔧 Getting Started

Prerequisites

  • Operating System: Linux is recommended.
  • Virtualization Software: GNS3, VirtualBox, or similar for setting up a virtual lab.
  • Networking Tools: Wireshark, Snort, internal DNS server (e.g., BIND or dnsmasq).
  • Basic Knowledge: Familiarity with Linux networking, packet analysis, and IDS configuration.

Installation & Setup

  1. Clone the Repository

    git clone https://github.com/yourusername/secure-network-ids-lab.git
    cd secure-network-ids-lab
  2. Install Dependencies

    • For Packet Capture & Analysis: Install Wireshark:

      sudo apt-get install wireshark
    • For Intrusion Detection: Install Snort:

      sudo apt-get install snort
    • Internal DNS Setup: Install and configure BIND or dnsmasq as per your network requirements.

  3. Setup Virtual Lab Environment

    • Use GNS3 or VirtualBox to create a network topology that follows a mesh design. Configure multiple virtual nodes and ensure the internal DNS services are accessible to the network.
    • Configure logging by setting up syslog or custom logging scripts in /var/log/ to store network traffic data for further analysis.
  4. Configure Snort

    • Customize Snort configuration files (usually found in /etc/snort/) with rules that monitor for DDoS patterns and ARP spoofing signatures.

    • Launch Snort in IDS mode:

      sudo snort -A console -q -c /etc/snort/snort.conf -i <interface>
  5. Running Simulations

    • DDoS Simulation: Use custom scripts or network tools (e.g., hping3) to generate high volumes of traffic:

      hping3 --flood -p 80 <target_ip>
    • ARP Spoofing Simulation: Use tools like arpspoof to simulate ARP poisoning:

      sudo arpspoof -i <interface> -t <target_ip> <gateway_ip>
  6. Monitoring & Analysis

    • Launch Wireshark to inspect live traffic on the network interface.
    • Check Snort alerts to verify that the IDS is detecting the simulated threat events.

🗺️ Project Structure

secure-network-ids-lab/
│
├── docs/                  # Additional documentation and configuration guidelines
├── configs/               # Configuration files for Snort, internal DNS, etc.
├── scripts/               # Automation scripts for simulations (DDoS, ARP spoofing)
├── logs/                  # Directory for storing traffic logs and IDS alerts
├── virtual_lab_setup.md   # Documentation on how to set up the virtual lab environment
└── README.md              # This documentation file

📈 Future Enhancements

  • Expanded Threat Simulations: Incorporate additional attack scenarios like Man-in-the-Middle (MitM) or ransomware simulations.
  • Automated Reporting: Generate and export detailed reports on network events and IDS alerts.
  • GUI Enhancements: Develop a web-based dashboard for real-time network status, alerts, and configuration management.
  • Integration with SIEM: Interface the lab with a Security Information and Event Management (SIEM) system for advanced analytics.

🤝 Contributing

Contributions and suggestions are welcome! If you wish to enhance this lab environment or add new simulation scenarios, please fork the repository and submit a pull request. For major changes, please open an issue first to discuss the proposal.


📄 License

This project is licensed under the MIT License. See the LICENSE file for details.


👨‍💻 Author

Obakeng Mdonyelwa 🔗 GitHub 🔗 LinkedIn

About

Secure Network & IDS: Simulated cybersecurity threats like DDoS and ARP spoofing in a virtual lab. Implemented a mesh network topology with internal DNS, traffic logging, and an intrusion detection system (IDS) using tools like Wireshark and Snort for real-time threat monitoring.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors