Show simple item record

dc.contributor.authorLow, Kar Xin
dc.date.accessioned2016-08-16T02:32:38Z
dc.date.available2016-08-16T02:32:38Z
dc.date.issued2015-12
dc.identifier.urihttp://dspace.unimap.edu.my:80/xmlui/handle/123456789/42548
dc.descriptionAccess is limited to UniMAP community.en_US
dc.description.abstractSecurity administration plays a vital role in network management task. The intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical network information systems. During recent years, number of intruders on networks has increased so there is a need of reliable network and this is the current hot topic among researchers. Intrusion detection is a technique to detect unauthorized access to the network. An intrusion detection system (IDS) monitors system and network to detect intruders that are trying to gather information on network for which they are not authorized. Snort is one of the IDS tool which can give alert to the authentication user or Network Administrator by giving alarm for misuse of network. Snort Intrusion detection System consists of procedures for detection of illegal activity of system that identify the intruders. Firstly, some important intrusion prevention activities are writing and implementing good security Snort rule. Secondly, planning and performing effective information security like execute the Snort rule to detect attackers coming from external network. Lastly, installing and testing technology based information security system for counting intruders activities like Snort, WinPcap and Wireshark. In information security intrusion detection systems (IDS) works like a burglar alarm in that it detects destruction and activate an alarm. There are 3 types of mode in Snort that can be used to capture packet for illegal activities. When the packets match with the Snort rule, Snort will capture the data and then put it onto a log file. Snort is operated on TCP/IP Network Layer. Therefore, Wireshark acts as a display data platform to do analysis protocol that had captured packets by Snort.en_US
dc.language.isoenen_US
dc.publisherUniversiti Malaysia Perlis (UniMAP)en_US
dc.subjectIntrusion detection systemen_US
dc.subjectDetection systemen_US
dc.subjectIntrusion detection system -- Design and constructionen_US
dc.subjectSecurityen_US
dc.subjectNetwork information systemsen_US
dc.subjectNetwork information systems -- Securityen_US
dc.titleIntrusion detection systemen_US
dc.typeLearning Objecten_US
dc.contributor.advisorRosanatrah Ramlien_US
dc.publisher.departmentFaculty of Engineering Technologyen_US


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record