Browse By Repository:

 
 
 
   

Intrusion Detection System IDS For Detecting Network Threats And Vulnerabilities

Lee, Yew Loon (2004) Intrusion Detection System IDS For Detecting Network Threats And Vulnerabilities. Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img] Text (24 page)
Intrusion Detection System IDS For Detecting Network Threats And Vulnerabilities.pdf - Submitted Version

Download (1MB)

Abstract

Intrusion Detection System (IDS) is a relatively new addition to the field of computer security. It is concerned with software that can distinguish between legitimate users and malicious users of a computer system and make a controlled response when an attacker is detected. The project proposed is mainly for the purpose to detect any network vulnerabilities and threats by providing an extra layer of security to SCS Computer System Sdn. Bhd. where the company is currently using only firewall for security protection. Network Intrusion Detection System (NIDS) has been selected to be used in the project implementation. NIDS provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. There are various commercial NIDS in market, but they may have complex deployment and high monetary cost. The project was designed to address these issues. The purpose of research, particularly literature reviews is to collect data. Through this literature review, scope of project and user requirements can be retrieved whether how big the project is. Prototyping Model has been chosen as a methodology for this project and will be implemented along the system development process to ensure the objectivesof the project can be fulfilled. The project proposed is planned to develop IDS technology on the Linux platform. The IDS is using misuse detection which is based on signature recognition. A combination of five primary software packages will be included in the system development for enhancing the IDS usage. With these powerful technologies, the system is not only expected to be workable, but also highly efficient in terms of execution speed and response time. This IDS project will contribute effort to users. In addition to identifying attacks and suspicious activity, IDS data can be used to identify security vulnerabilities and weaknesses.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Computer security, Computer networks -- Security measures Internet -- Security measures, Computer -- Access control
Subjects: T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Final Year Project > FTMK
Depositing User: Zulkarnaen Mahat
Date Deposited: 05 Jan 2016 02:25
Last Modified: 05 Jan 2016 02:25
URI: http://digitalcollection.utem.edu.my/id/eprint/15483

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year