INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN SOCIAL SCIENCE (IJRISS)
ISSN No. 2454-6186 | DOI: 10.47772/IJRISS | Volume IX Issue XI November 2025
Figure 1 depicts a Software Development Life Cycle (SDLC), which is a procedure for organizing, developing,
testing, and implementing information systems, is depicted in the diagram. Its five primary stages are grouped
in a cyclical flow that represents the iterative process of system development [12].
Planning Phase
During the planning stage, the project's groundwork is created to guarantee a systematic and efficient system
development process. The project scope, which includes determining the goals, contribution, and questions, is
defined at the start of this phase. The main objectives are to study the capabilities of the integration of Wazuh
and Suricata in addition to identifying the design that can be implemented which produces an effective integration
system to be evaluated. Having conversations with the project supervisor is essential for making sure the project
meets technical and academic requirements while anticipating and resolving any issues. To guarantee clarity and
viability, the project's goals and scope were clarified during these meetings.
To determine the tools, hardware, software, and configuration required for system implementation, a thorough
requirements analysis is carried out. This entails using Suricata for network-based intrusion detection and
assessing Wazuh's suitability and capabilities for log management, monitoring, and intrusion detection. To
improve threat awareness and response, Telegram will also be recognized as the medium for real-time multi-
attack notifications. Deliverables and milestones for every stage of the Software Development Life Cycle
(SDLC) are used to create the project timetable. To make sure the project stays on course, important tasks
including system design, tool configuration, attack simulation, and testing are planned with suitable due dates.
Resources are distributed according to the needs of the system, including a virtualized testing environment,
attack simulation datasets, and monitoring tools.
Analysis Phase
Analysis phase is carried out to gain a comprehensive understanding of the system that will be constructed, a
complete and comprehensive assessment of the project requirements, tools, and objectives. The functionality of
Wazuh and Suricata as essential elements for threat detection is examined in this phase, along with how they
might be combined with Telegram to provide real- time alerts. This phase's main objective is to examine the
chosen tools' capabilities and make sure they complement the project's goals, particularly in terms of identifying
various assaults including port scanning, brute-force attacks, and denial of service (DoS). This phase starts with
an in-depth literature review of Wazuh and Suricata, studying their features, limitations and strength. In addition,
Telegram is analyzed as a medium of communication to generate real-time alerts. The analysis highlights
verifying that notifications are delivered promptly and in a structured format.
Arequirement gathering procedure is carried out to determine the hardware, software, and network specifications
required to construct and test the system to support the analytical phase even further. This entails determining
the resources needed to create a virtualized testing environment in which Wazuh and Suricata will function
without a hitch. Virtual machines, attack simulation, network setups, and enough processing power to manage
logs and traffic data are essential elements.
To guarantee appropriate simulation and detection techniques, the sorts of attacks to be evaluated are thoroughly
examined. Analyzing traffic patterns to spot irregularities such abnormally high request volumes is the main goal
of a study on Denial of Service (DoS) attacks. Monitoring login attempts is part of the analytic process for brute-
force attacks in order to identify recurring, unsuccessful authentication attempts that could be signs of an attack.
The establishment of rules to detect unauthorized scanning activities is made possible by the final examination
of port scanning, which aims to understand how attackers find open ports and vulnerabilities.
Choosing the metrics and assessment standards that will be applied to measure the system's efficacy is another
task for this phase. To assess how well the system detects and reacts to the simulated attacks, metrics including
detection accuracy, response time, false positives/negatives, and notification delivery time are set up. The project
needs, resources, and tools are completely understood at the end of the analysis phase, and a thorough
implementation plan is created. This stage guarantees that every part is in line, possible problems are found, and
the system design can move forward with a strong base.
Page 4809