Browse By Repository:

 
 
 
   

An Analysis Of Intrusion Detection System

Fazilah, Fuzi (2011) An Analysis Of Intrusion Detection System. Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img] PDF (24 pages)
An_Analysis_Of_Intrusion_Detection_System_-_24_pages.pdf - Submitted Version

Download (525kB)
[img] PDF (Full Text)
An_Analysis_Of_Intrusion_Detection_System_-_Full_Text.pdf - Submitted Version
Restricted to Registered users only

Download (16MB)

Abstract

Intrusion Detection System (IDS) is a relatively new addition to the field of computer security. It is concerned with software that can distinguish between legitimate, users and malicious users of a computer system. This project is about the Intrusion Detection System using Snort and Sax2 to give security for wireless network. In this project, the capabilities of Snort and Sax2 will be discussed. A detailed explanation of how to install Snort and Sax2, including the installation and configuration of Snort for use as an IDS. Network Intrusion Detection System (NIDS) has been selected to be used in the project implementation. NIDS provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alerts system administrators when potential hostile traffic is detected. There are various commercial NIDS in market, but they may have complex deployment and high monetary cost. The purpose of research, particularly literature review is to collect data. Through this literature review, scope of project and user requirements can be retrieved whether how big the project is. The project methodology that will be going to use in this project is Systems Development Life Cycle (SDLC) approach. The IDS developed consists of weaknesses and strength in its functionality. This software is configured using Linux operating system and MySQL server as database. Overall this implementation of security will give more benefit and information's to users that want to monitor their network.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Computer security, Computer networks -- Security measures, Security systems
Subjects: T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Final Year Project > FTMK
Depositing User: Mi Azian Ab. Karim
Date Deposited: 11 Oct 2012 07:04
Last Modified: 28 May 2015 03:40
URI: http://digitalcollection.utem.edu.my/id/eprint/6167

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year