Nurul Afiqah, Ibrahim (2011) Testing And Analyze Type Of Scanning Tools Based On Threshold At Anomaly Detection. Project Report. UTeM, Melaka, Malaysia. (Submitted)
![]() |
PDF (24 Pages)
Testing_And_Analyze_Type_Of_Scanning_Tools_Based_On_Threshold_At_Anomaly_Detection_-_24_pages.pdf - Submitted Version Download (571kB) |
![]() |
PDF (Full Text)
Testing_And_Analyze_Type_Of_Scanning_Tools_Based_On_Threshold_At_Anomaly_Detection.pdf - Submitted Version Restricted to Registered users only Download (4MB) |
Abstract
is project focuses on testing and analyzes threshold with 15 type of ool. Anomaly - based intrusion d etection cooperates with snort threshold. two primary methods of detection used by IDS's, signature and anomaly. ct only focuses on Anomaly detection. Beside that Snort is a famous etection system in field of open source software analyze by Basic Analysis ity Engine (BASE). This test is the way to prevent and care the networks, sca nning tool to detect what port is open or close. Then change the to test any changes or find specific threshold that valid for specific attack ght now everything is at fingertips, easy and all source already have then any kind of software to make more easier for hacker or somebody try to network because, scanning port is first way to attack and make strategy.
Item Type: | Final Year Project (Project Report) |
---|---|
Uncontrolled Keywords: | Peer-to-peer architecture (Computer networks), Computer networks -- Security measures, Computers -- Access control |
Subjects: | T Technology > T Technology (General) T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Library > Final Year Project > FTMK |
Depositing User: | Users 136 not found. |
Date Deposited: | 15 Oct 2012 03:28 |
Last Modified: | 28 May 2015 03:41 |
URI: | http://digitalcollection.utem.edu.my/id/eprint/6305 |
Actions (login required)
![]() |
View Item |