Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan

Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various...

Full description

Saved in:
Bibliographic Details
Main Author: Daud, Ali Yusny
Format: Thesis
Language:English
Published: 2002
Subjects:
Online Access:http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF
http://eprints.utm.my/id/eprint/6665/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.6665
record_format eprints
spelling my.utm.66652018-09-27T04:01:52Z http://eprints.utm.my/id/eprint/6665/ Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan Daud, Ali Yusny QA75 Electronic computers. Computer science Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form makes detection by IDS very complicated and involving a lot of resource usage. Lack of resources in the IDS will affect intrusion detection and fail to overcome the attack. The purpose of this research is to analyse distributed attacks to a single IDS host and resource usage when it detecting the attacks. Simulation technique is used to present reality in intrusion detection. Simulation is applicable because in reality, intrusion's analysis involved large scale and high costing. The research will focus to the analysis of the simulation and using the result for IDS to make an efficient detection. 2002-02 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF Daud, Ali Yusny (2002) Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Daud, Ali Yusny
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
description Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form makes detection by IDS very complicated and involving a lot of resource usage. Lack of resources in the IDS will affect intrusion detection and fail to overcome the attack. The purpose of this research is to analyse distributed attacks to a single IDS host and resource usage when it detecting the attacks. Simulation technique is used to present reality in intrusion detection. Simulation is applicable because in reality, intrusion's analysis involved large scale and high costing. The research will focus to the analysis of the simulation and using the result for IDS to make an efficient detection.
format Thesis
author Daud, Ali Yusny
author_facet Daud, Ali Yusny
author_sort Daud, Ali Yusny
title Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_short Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_full Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_fullStr Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_full_unstemmed Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_sort analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
publishDate 2002
url http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF
http://eprints.utm.my/id/eprint/6665/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336
_version_ 1643644611435954176