Software Requirements Specifications1

Preview:

Citation preview

  • 7/28/2019 Software Requirements Specifications1

    1/7

    Software Requirements Specifications

    For In-line Prevention System

  • 7/28/2019 Software Requirements Specifications1

    2/7

    Introduction:

    Security is a big issue for all networks in today's network environment.

    Many methods have been developed to secure the network infrastructure and communication

    over the Internet. One relatively new one is In-line intrusion prevention system. The IPS

    Placed between Trusted network and Untrusted network .The IPS It is one type of Network

    Based Prevention solution using Snort and Deter lab.

    Product Scope:

    IPS is a network based intrusion prevention system aimed to provide

    accurate and real-time network intrusion prevention solution to network based known attacks

    and IPS can provide security such as the best can do to improve the security of the system is

    place them behind filters Then the Network Prevent from the malicious events without modify

    the existing Network.

  • 7/28/2019 Software Requirements Specifications1

    3/7

    System Features

    1. Analyze the network traffic and capture the Data

    Functional Requirements:

    REQ-1: login deter lab with user name and password

    REQ-2: Open The SEER and Experiment swapped in, open SSh terminal and putty on

    Linux Ubuntu

    REQ-3: Connect to router.[experiment name].[project name].isi Must follow this syntax

    REQ-4: Use command-line tool called TCPDUMP It's a very common and useful tool for

    looking at network traffic .

    REQ-5: One of the most important thing need, especially Snort in IPS mode, is a really big

    reasonably fast hard drive for storing data as log files or in a database, to need a lot

    of space to store all

  • 7/28/2019 Software Requirements Specifications1

    4/7

    2. Active mode:

    Functional Requirements:

    REQ-1: User is asked for username and password

    REQ-2: User is given to enter his login name and password failing which the screen is locked

    and alert is generated in the form of a popup box .

    REQ-3: After verifying the login, the user is granted access to the front end of the Inline

    Prevention system

    REQ-4: The interface has commands for starting the detector. The interface also displays thenumber of packets sessions, graphically, arriving in the adopted timeframe and locked text

    box to show current statistics of normal and incoming profile.

    REQ-5: If an malicious attacks occurs the pop-up box appears along with a alert to the

    administrators of a network.

    REQ-6:If the user presses the start button the detector starts executing and looking for misdirected

    traffic.

    REQ-7: If the user presses stop, the detector stops working.

    REQ-8: Once a user logs out he is asked to provide the login information again to access the

    application.

  • 7/28/2019 Software Requirements Specifications1

    5/7

    Other Nonfunctional Requirements

    I. Performance Requirements: The system has very high protection rate (i.e., no less than

    99%) in any circumstances. Similarly the system has very low false alert rate (i.e., no more

    than 1%) in any circumstances.

    II. Safety Requirements: There are no specific safety requirements associated with the

    proposed system. The IPS is composed of well known and commonly used hardware whichdoes not cause any safety hazards. SEERGUI cannot attach with experiment then relogin.

    III. Security Requirements: Only authorized personn are allowed to use the product and go

    through selection procedures. In case of forgotten passwords contact the developers.

    Similarly, changing the features of the solutions at runtime also requires password based

    authentication.

  • 7/28/2019 Software Requirements Specifications1

    6/7

    IV. Software Quality Attributes:

    o Reliability: IPS should provide reliability to the user that the product will run available and

    executing perfectly

    o Accuracy: IPS should be able to reach the desired prevention level

    o Resources: IPS should use minimal resources in terms of memory, time and CPU.

    o User Friendliness: IPS should have a graphical user interface with user friendly menu with

    SEER.

    V . Business RulesIPS is most suitable for network administrators of large enterprises. The product should be

    used with precaution to avoid loss of data with less cost. Major advantage is without modify

    the old data or network providing security.

  • 7/28/2019 Software Requirements Specifications1

    7/7

    Thanking you !

Recommended