Total Submissions : 4

Breach detection systems attempt to discover malwares and intrusion attempts that bypass the traditional security detection mechanisms. Unlike IPS or firewall that scan incoming traffic, BDS focuses on malicious activity within the network it protects. It determines possible breaches by differing combinations of heuristics traffic analysis, risk assessment, safe marked traffic, data policy understanding and violation report. Design and implement a breach detection system capable of detecting breach as soon as possible.

Notes: In order to simulate breach use, setup a small network with missing IPS and firewall. Simulate an attack scenario where perimeter has been breached and use your solution to demonstrate successful detection of breach.

Sample Data Required: No