• Login
    View Item 
    •   DSpace Home
    • Final Year Project Papers & Reports
    • Faculty of Engineering Technology (FYP)
    • View Item
    •   DSpace Home
    • Final Year Project Papers & Reports
    • Faculty of Engineering Technology (FYP)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Intrusion detection system

    Thumbnail
    View/Open
    Abstract,Acknowledgement.pdf (208.0Kb)
    Introduction.pdf (180.4Kb)
    Literature Review.pdf (496.7Kb)
    Methodology.pdf (469.0Kb)
    Results and Discussion.pdf (2.005Mb)
    Conclusion and Recommendation.pdf (99.03Kb)
    Results and Discussion.pdf (2.005Mb)
    Date
    2015-12
    Author
    Low, Kar Xin
    Metadata
    Show full item record
    Abstract
    Security administration plays a vital role in network management task. The intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical network information systems. During recent years, number of intruders on networks has increased so there is a need of reliable network and this is the current hot topic among researchers. Intrusion detection is a technique to detect unauthorized access to the network. An intrusion detection system (IDS) monitors system and network to detect intruders that are trying to gather information on network for which they are not authorized. Snort is one of the IDS tool which can give alert to the authentication user or Network Administrator by giving alarm for misuse of network. Snort Intrusion detection System consists of procedures for detection of illegal activity of system that identify the intruders. Firstly, some important intrusion prevention activities are writing and implementing good security Snort rule. Secondly, planning and performing effective information security like execute the Snort rule to detect attackers coming from external network. Lastly, installing and testing technology based information security system for counting intruders activities like Snort, WinPcap and Wireshark. In information security intrusion detection systems (IDS) works like a burglar alarm in that it detects destruction and activate an alarm. There are 3 types of mode in Snort that can be used to capture packet for illegal activities. When the packets match with the Snort rule, Snort will capture the data and then put it onto a log file. Snort is operated on TCP/IP Network Layer. Therefore, Wireshark acts as a display data platform to do analysis protocol that had captured packets by Snort.
    URI
    http://dspace.unimap.edu.my:80/xmlui/handle/123456789/42548
    Collections
    • Faculty of Engineering Technology (FYP) [167]

    Related items

    Showing items related by title, author, creator and subject.

    • Malaysia : System of existing terrestrial parks and reserves, 1984 

      Unit Perancang Ekonomi (Jabatan Percetakan Negara, 1986)
    • Performance indicators of the eletricity supply systems, 1995-2000 

      Unit Perancang Ekonomi (Unit Perancang Ekonomi, Jabatan Perdana Menteri, 2001)
    • Improving system performance through operating system optimization on embedded devices platform 

      Daud, S.; Khalib, Z.I.A.; R. Badlishah, Ahmad (Institute of Electrical and Electronics Engineering (IEEE), 2008-05)
      Implemented with a low speed CPU, small memory footprint, low static memory storage and developed specifically for low power requirement, small embedded devices are significantly affected by processing time. By cutting ...

    Atmire NV

    Perpustakaan Tuanku Syed Faizuddin Putra (PTSFP) | Send Feedback
     

     

    Browse

    All of UniMAP Library Digital RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Statistics

    View Usage Statistics

    Atmire NV

    Perpustakaan Tuanku Syed Faizuddin Putra (PTSFP) | Send Feedback