Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan

Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various...

Full description

Saved in:
Bibliographic Details
Main Author: Daud, Ali Yusny
Format: Thesis
Language:English
Published: 2002
Subjects:
Online Access:http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.6665
record_format uketd_dc
spelling my-utm-ep.66652018-09-27T04:01:52Z Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan 2002-02 Daud, Ali Yusny QA75 Electronic computers. Computer science Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form makes detection by IDS very complicated and involving a lot of resource usage. Lack of resources in the IDS will affect intrusion detection and fail to overcome the attack. The purpose of this research is to analyse distributed attacks to a single IDS host and resource usage when it detecting the attacks. Simulation technique is used to present reality in intrusion detection. Simulation is applicable because in reality, intrusion's analysis involved large scale and high costing. The research will focus to the analysis of the simulation and using the result for IDS to make an efficient detection. 2002-02 Thesis http://eprints.utm.my/id/eprint/6665/ http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:62336 masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information System Faculty of Computer Science and Information System
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Daud, Ali Yusny
Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
description Research field in information security is a critical research to defend of. It's trivial for protecting important information from the enemy or to unauthorized person. Intrusion Detection System (IDS) is a tool in supporting to defend from the threats. Distributed threats or attacks in various form makes detection by IDS very complicated and involving a lot of resource usage. Lack of resources in the IDS will affect intrusion detection and fail to overcome the attack. The purpose of this research is to analyse distributed attacks to a single IDS host and resource usage when it detecting the attacks. Simulation technique is used to present reality in intrusion detection. Simulation is applicable because in reality, intrusion's analysis involved large scale and high costing. The research will focus to the analysis of the simulation and using the result for IDS to make an efficient detection.
format Thesis
qualification_level Master's degree
author Daud, Ali Yusny
author_facet Daud, Ali Yusny
author_sort Daud, Ali Yusny
title Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_short Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_full Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_fullStr Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_full_unstemmed Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
title_sort analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan
granting_institution Universiti Teknologi Malaysia, Faculty of Computer Science and Information System
granting_department Faculty of Computer Science and Information System
publishDate 2002
url http://eprints.utm.my/id/eprint/6665/1/AliYusnyDaudMFC2002.PDF
_version_ 1747814683447918592