Browse By Repository:

 
 
 
   

Testing And Analyze Type Of Scanning Tools Based On Threshold At Anomaly Detection

Nurul Afiqah, Ibrahim (2011) Testing And Analyze Type Of Scanning Tools Based On Threshold At Anomaly Detection. Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img] PDF (24 Pages)
Testing_And_Analyze_Type_Of_Scanning_Tools_Based_On_Threshold_At_Anomaly_Detection_-_24_pages.pdf - Submitted Version

Download (571kB)
[img] PDF (Full Text)
Testing_And_Analyze_Type_Of_Scanning_Tools_Based_On_Threshold_At_Anomaly_Detection.pdf - Submitted Version
Restricted to Registered users only

Download (4MB)

Abstract

is project focuses on testing and analyzes threshold with 15 type of ool. Anomaly - based intrusion d etection cooperates with snort threshold. two primary methods of detection used by IDS's, signature and anomaly. ct only focuses on Anomaly detection. Beside that Snort is a famous etection system in field of open source software analyze by Basic Analysis ity Engine (BASE). This test is the way to prevent and care the networks, sca nning tool to detect what port is open or close. Then change the to test any changes or find specific threshold that valid for specific attack ght now everything is at fingertips, easy and all source already have then any kind of software to make more easier for hacker or somebody try to network because, scanning port is first way to attack and make strategy.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Peer-to-peer architecture (Computer networks), Computer networks -- Security measures, Computers -- Access control
Subjects: T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Final Year Project > FTMK
Depositing User: Users 136 not found.
Date Deposited: 15 Oct 2012 03:28
Last Modified: 28 May 2015 03:41
URI: http://digitalcollection.utem.edu.my/id/eprint/6305

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year