Optimize Non-Profit Company Network Performance

Monitored and studied network to isolate and eliminate performance hindering problems. First, an extra DHCP server had been installed unintentionally and the service was shut down. The actual DHCP server was then found to be issuing old DNS information and causing an extreme lag when DNS always had to be routed to the secondary Google servers. The DNS information was updated to reflect the new DCs on the intranet.
This caused systems to be much more responsive, but brought to light a new problem. The whole intranet had become an island where time was not being properly read from NTP servers. Noticed by a client when her computer and cell phone clocks did not match, the intranet was about 5 minutes slow. The problem ended up residing in the firewall, which maintained an NTP service with incorrectly configured time. Whats more is that the firewall also redirected externally addressed NTP traffic to itself, causing everything inside the network to get its time. Once time was updated on the firewall, the intranet began keeping in time with external sources.


Project Student: Blake Kindred

Security Onion

Security Onion is a Ubuntu-based Linux distribution intended to be used as an IDS (intrusion detection system). It contains several security software tools. The Living Lab already had a server with Security Onion running. We spent some time near the end of the semester getting the existing system running and finally configuring the IDS in order to register alerts from traffic going over the Living Lab’s internal network. Later semesters will see the system expanded to monitor more networks that the Living Lab has.

Project Team Members: Bandar Alotibi, Luke Cotton

Cyber Security Open

The Cyber Security Open is a convention that the Living Lab will host, intended for beginners and professionals interested in the field of security. It is broken into 5 different missions. We went through, ran through the missions, and familiarized ourselves with them. We also updated the existing setups for each mission so they would be ready for the day of the event. Due to unexpected circumstances, we had to cancel the event this semester, but everything is ready for the students to host the event next semester.

Project Team Members: Bandar Alotibi, Luke Cotton

Cyber Security Open

The Cyber Security Open Project will serve the purpose of educating undergraduate college students in how to use Information Security tools such as Kali Linux, Nmap, and Wireshark. The project consists of six missions, each requiring the use of specific hardware and software tools. Our job is to review and edit the current documentation, and add more instructions to help the students understand the missions clearly. Also, we are going to test the missions to make sure that all the software is up to date and the hardware tools are functioning properly.

We were able to accomplish the missions and recreate documentations for each mission. Each mission now has a setup and step-by-step guides. We also added screenshots to each guide to make the missions easier to accomplish by other students.

Student Team Members:  Abdulaziz Alzaben, Toby Robinson


Spiceworks – Network Lab Monitor Project

The public and private networks within the ET building need to be monitored.  The network monitor is to be able to track the system resources on each computer, log software installations, watch the network traffic, and generate help desk tickets.  The server is running on a virtual machine, utilizing Windows Server 2012 R2.  The monitoring software we have used is called “Spiceworks”.  The server is configured to detect issues outside of normal expected ranges and then sends alerts to the administrator for immediate action.  If necessary, the network monitor is able to take steps automatically to prevent problems.

Project Student: Joshua Cappel, Bindesh Patel, Mark Robertson

Cyber Security Open: CITCON

Our project is to take cyber security tasks that were created last semester and understand the complete ins and outs of the system. After the understanding, we will take this information and work on a conference for these tasks. This conference is being started from the ground up to understand the making of the conference as in a managerial point of view. We are accessing new ideas in marketing point of view as well as individual testing of the equipment with trial runs. The trial runs give us an excellent overview of a time line that we may expect.

We want to provide an opportunity for participants to learn the tool, not just the scenarios. Each specific tool from Nmap to Wireshark have an individual lesson plan for instructors to lead with. We created handouts after the practice-run to assist in guiding the focus of participants and cut down the amount of time they need to search online for common commands. The Cyber Security Open is a large effort by all members involved and will continue beyond this semester to be fully realized by the Fall 2015 Semester.

Student Team Members: Nicholas Balvin-Waggoner, Heath Simon, Dhaval Joshi, David Smith, Stanko Andric

SCCM Implementation

Local University department technical services will be utilizing the Microsoft System Center Configuration Manager (SCCM) to quickly deploy operating systems and apps along with software updates to new and existing workstations and mobile devices.  This will allow the ability to quickly perform hardware and software inventory as well as ensuring compliance through monitoring and remediation.  IT professionals will be able to perform remote administration of managed devices and clients over the Internet.

SCCM also provides the Software Center for users.  It contains approved software that users can install on their own without having administrative rights.  This cuts down on tickets from users who are just trying to install software.  Users can also request software if it is not available.

The User State Migration Tool 5.0 (USMT) will be utilized to help move existing user’s files, application settings, and network mapped drives and printers onto new computers.  This will save time and money.

The various devices will have to be added to the domain and have their security policies properly setup before being turned over to the client.  This uses knowledge about Active Directory, domain services, and utilizing the Microsoft Management Console.

Project Student: Allison Shular

Network Security Monitor Server

The objective of this project is building up a network security monitor sever to monitor the networks of the classrooms in the basement. Students are required to use the Security Onion Linux system and Snort to accomplish the task.

At the end of the semester, the server has been set up, and Security Onion is installed. An SSH server is also installed and configured for remote access. Snorby has been configured so that it can receive network traffic now.

Project Student: Ruifeng Wnag

Spiceworks – Ticketing system and Monitor System

Our project was to find the ticketing and network monitor software. We were using the Spiceworks software for ticketing and network monitor software at beginning of the semester. We installed both of the software on the Windows Server 2008. We started testing the  Networking Monitor Software first and then ticketing system software. We had to find another ticketing system software for our project because of the client requirement. We are using the ManageEngine ServiceDesk Plus software for the multiple client ticketing system software.


Project Team Members: Bindesh Patel, Mark Robertson

POE Camera Team

The POE Camera project involves the use of Power over Ethernet Cameras to improve current visual coverage and theft prevention. To begin, we had to schedule interviews with our clients from the University Course to record their requests and create a list of requirements. Our next step of action was to research appropriate security camera layouts. Using the floor plans we were able to create a schematic of our proposed design to submit for approval. While waiting for approval we began to familiarize ourselves with the cameras through testing. When we receive approval we will begin the process of measuring and cutting the cables, running the cables through the ceiling, and installing the cameras.

 Student Team Members: David Smith,  Oluwatobi Omorodion