Intrusion detection system

Access is limited to UniMAP community.

Saved in:
Bibliographic Details
Main Author: Low, Kar Xin
Other Authors: Rosanatrah Ramli
Format: Learning Object
Language:English
Published: Universiti Malaysia Perlis (UniMAP) 2016
Subjects:
Online Access:http://dspace.unimap.edu.my:80/xmlui/handle/123456789/42548
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.unimap-42548
record_format dspace
spelling my.unimap-425482020-04-28T07:15:03Z Intrusion detection system Low, Kar Xin Rosanatrah Ramli Intrusion detection system Detection system Intrusion detection system -- Design and construction Security Network information systems Network information systems -- Security Access is limited to UniMAP community. Security administration plays a vital role in network management task. The intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical network information systems. During recent years, number of intruders on networks has increased so there is a need of reliable network and this is the current hot topic among researchers. Intrusion detection is a technique to detect unauthorized access to the network. An intrusion detection system (IDS) monitors system and network to detect intruders that are trying to gather information on network for which they are not authorized. Snort is one of the IDS tool which can give alert to the authentication user or Network Administrator by giving alarm for misuse of network. Snort Intrusion detection System consists of procedures for detection of illegal activity of system that identify the intruders. Firstly, some important intrusion prevention activities are writing and implementing good security Snort rule. Secondly, planning and performing effective information security like execute the Snort rule to detect attackers coming from external network. Lastly, installing and testing technology based information security system for counting intruders activities like Snort, WinPcap and Wireshark. In information security intrusion detection systems (IDS) works like a burglar alarm in that it detects destruction and activate an alarm. There are 3 types of mode in Snort that can be used to capture packet for illegal activities. When the packets match with the Snort rule, Snort will capture the data and then put it onto a log file. Snort is operated on TCP/IP Network Layer. Therefore, Wireshark acts as a display data platform to do analysis protocol that had captured packets by Snort. 2016-08-16T02:32:38Z 2016-08-16T02:32:38Z 2015-12 Learning Object http://dspace.unimap.edu.my:80/xmlui/handle/123456789/42548 en Universiti Malaysia Perlis (UniMAP) Faculty of Engineering Technology
institution Universiti Malaysia Perlis
building UniMAP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Perlis
content_source UniMAP Library Digital Repository
url_provider http://dspace.unimap.edu.my/
language English
topic Intrusion detection system
Detection system
Intrusion detection system -- Design and construction
Security
Network information systems
Network information systems -- Security
spellingShingle Intrusion detection system
Detection system
Intrusion detection system -- Design and construction
Security
Network information systems
Network information systems -- Security
Low, Kar Xin
Intrusion detection system
description Access is limited to UniMAP community.
author2 Rosanatrah Ramli
author_facet Rosanatrah Ramli
Low, Kar Xin
format Learning Object
author Low, Kar Xin
author_sort Low, Kar Xin
title Intrusion detection system
title_short Intrusion detection system
title_full Intrusion detection system
title_fullStr Intrusion detection system
title_full_unstemmed Intrusion detection system
title_sort intrusion detection system
publisher Universiti Malaysia Perlis (UniMAP)
publishDate 2016
url http://dspace.unimap.edu.my:80/xmlui/handle/123456789/42548
_version_ 1670805786858618880
score 13.222552