Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2002
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF http://eprints.utm.my/id/eprint/6665/ http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.6665 |
---|---|
record_format |
eprints |
spelling |
my.utm.66652018-09-27T04:01:52Z http://eprints.utm.my/id/eprint/6665/ Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan Daud, Ali Yusny QA75 Electronic computers. Computer science Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form makes detection by IDS very complicated and involving a lot of resource usage. Lack of resources in the IDS will affect intrusion detection and fail to overcome the attack. The purpose of this research is to analyse distributed attacks to a single IDS host and resource usage when it detecting the attacks. Simulation technique is used to present reality in intrusion detection. Simulation is applicable because in reality, intrusion's analysis involved large scale and high costing. The research will focus to the analysis of the simulation and using the result for IDS to make an efficient detection. 2002-02 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF Daud, Ali Yusny (2002) Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Daud, Ali Yusny Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
description |
Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form makes detection by IDS very complicated and involving a lot of resource usage. Lack of resources in the IDS will affect intrusion detection and fail to overcome the attack. The purpose of this research is to analyse distributed attacks to a single IDS host and resource usage when it detecting the attacks. Simulation technique is used to present reality in intrusion detection. Simulation is applicable because in reality, intrusion's analysis involved large scale and high costing. The research will focus to the analysis of the simulation and using the result for IDS to make an efficient detection. |
format |
Thesis |
author |
Daud, Ali Yusny |
author_facet |
Daud, Ali Yusny |
author_sort |
Daud, Ali Yusny |
title |
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
title_short |
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
title_full |
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
title_fullStr |
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
title_full_unstemmed |
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
title_sort |
analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan |
publishDate |
2002 |
url |
http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF http://eprints.utm.my/id/eprint/6665/ http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336 |
_version_ |
1643644611435954176 |