Wazuh: An Intrusion Detection System

Wazuh is an open-source intrusion detection system that uses individual agents to monitor user and network activities on a host-basis.   Suspicious activity is reported using alerts via email.  Agents were deployed to the workstations in the Living Lab through the use of group policy management.  The Auto-OSSEC tool developed by Binary Defense Systems provides automatically provisioning for agents in order…

IDS Network Security

The objective of the project is to install an intrusion detection system (IDS) for a University Course.  The client wanted an IDS installed and configured within the server room overseeing the computer lab that I.T. students uses for both classes and lab.  However, due to the level of knowledge of the students, the administration wanted…

Building an Asset Tracking Web Application

The project assigned to this intern is an asset tracking web application for a local landscaping company that operates out of Lizton, Indiana. This landscaping company has a big need to find an efficient way to store vital company data. In the past this company used excel spreadsheets to keep track of their inventory, payroll,…

Network / Security Analysts

This group’s project integrates multiple programs and software to enhance the security and monitoring of the Living Lab network. Some tools such as Proxmox, GRR, Spiceworks, OSquery, Veyon are used in order to create the proper environment to be able to monitor and examine the lab network and PCs. Using the tools allow for monitoring…

Jameson Camp Project – Drag and Drop Furniture

This project began with the intention of developing a web page that would allow users to overlook the floor-plans of their three different locations.  It should also include functionality that allows users to drop tables and chairs in the floor-plans and then submit them so that the tables and chairs can be arranged correctly.  One…

Qbot, A Linux Botnet Honeypot Analysis

The botnet honeypot project consists of a honeypot that has been created and left open on the web to entice botnet activity.  The honeypot is meant to attract curious criminals who are looking to attack open ports.  The project includes capturing the IP address, open port, and date of the inquiry.  The analysis includes looking up…

TRENDnet Switch API

The university lab wants the ability to modify settings on the 24-port TRENDnet switch without having to load the web interface. Unfortunately the TRENDnet switch does not come with a command line enabled, and also does not support SSH tunneling for remote use. The goal of the project is to create an API that would…

IDS/IPS Network Security Analyst

When an organization cannot afford to hire an external Security Operations Center(SOC), the logical choice is to implement its own SOC by deploying a Security Information and Event Management (SIEM). For our client (Living Lab) we implemented two open sourced solutions: SELKS and the Security Onion.  These tools allow a Security Analyst to gather granular…

Fake News Research Project

For my Fake News research project, I was tasked with researching about fake news and where it comes from by Dr. Justice. This is a rather broad topic, so I took a few different angles on the scope of my research. Firstly, I wanted to research about where fake news comes from and why someone…