dc.contributor.author | Low, Kar Xin | |
dc.date.accessioned | 2016-08-16T02:32:38Z | |
dc.date.available | 2016-08-16T02:32:38Z | |
dc.date.issued | 2015-12 | |
dc.identifier.uri | http://dspace.unimap.edu.my:80/xmlui/handle/123456789/42548 | |
dc.description | Access is limited to UniMAP community. | en_US |
dc.description.abstract | Security administration plays a vital role in network management task. The
intrusion detection systems are primarily designed to protect the availability,
confidentiality and integrity of critical network information systems. During recent
years, number of intruders on networks has increased so there is a need of reliable
network and this is the current hot topic among researchers. Intrusion detection is a
technique to detect unauthorized access to the network. An intrusion detection system
(IDS) monitors system and network to detect intruders that are trying to gather
information on network for which they are not authorized. Snort is one of the IDS tool
which can give alert to the authentication user or Network Administrator by giving
alarm for misuse of network. Snort Intrusion detection System consists of procedures
for detection of illegal activity of system that identify the intruders. Firstly, some
important intrusion prevention activities are writing and implementing good security
Snort rule. Secondly, planning and performing effective information security like
execute the Snort rule to detect attackers coming from external network. Lastly,
installing and testing technology based information security system for counting
intruders activities like Snort, WinPcap and Wireshark. In information security intrusion
detection systems (IDS) works like a burglar alarm in that it detects destruction and
activate an alarm. There are 3 types of mode in Snort that can be used to capture packet
for illegal activities. When the packets match with the Snort rule, Snort will capture the
data and then put it onto a log file. Snort is operated on TCP/IP Network Layer.
Therefore, Wireshark acts as a display data platform to do analysis protocol that had
captured packets by Snort. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Universiti Malaysia Perlis (UniMAP) | en_US |
dc.subject | Intrusion detection system | en_US |
dc.subject | Detection system | en_US |
dc.subject | Intrusion detection system -- Design and construction | en_US |
dc.subject | Security | en_US |
dc.subject | Network information systems | en_US |
dc.subject | Network information systems -- Security | en_US |
dc.title | Intrusion detection system | en_US |
dc.type | Learning Object | en_US |
dc.contributor.advisor | Rosanatrah Ramli | en_US |
dc.publisher.department | Faculty of Engineering Technology | en_US |