preview

Firewall Intrusion Detection And Honeypot Using Raspberry Pi

Better Essays

Firewall intrusion detection and Honeypot using Raspberry pi
Submitted in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Computer Engineering
By
Dishant Modi
130170107046

3.2 Schedule Representation…………………………………………………….16 3.2Risk Management………………………………………………………………17
3.2.1 Risk Identification………………………………………………………17
3.2.2 Risk analysis……………………………………………………………..17
3.2.3 Risk planning…………………………………………………………….18

4. System Modeling
4.1. Dataflow diagrams………………………………………………………19
4.1.1. Context Level Diagram…………………………………………19
4.1.2. Level - 1 DFD……………………………………………………..19
4.1.3. Level – 2 DFD……………………………………………………..20
4.2. Use case diagrams ………………………………………………………20
4.3. Activity Diagrams ..……………………………………………………...21
4.4. Sequence diagrams ……………………………………………………..22
4.5. Class Diagrams…………………………………………………………..23
4.6. System Architecture……………………………………………………..24
5. Configure Raspberry pi…………………………………………………………….25
6. Testing…………………………………………………………………………………30
7. Conclusion……………………………………………………………………………31
Bibliography and References…………………………………………………………32

Ied. A widely accepted alternative or at least complement to host-based security services is the firewall. The firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter. The aim of this perimeter is to protect the premises network from Internet-based attacks and to provide a single choke

Get Access