Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "1eb7536c-0b36-484c-a661-972e9d0af4f1"}, "_deposit": {"id": "4748", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4748"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4748", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Security Awareness of Network Infrastructure: Real-time Intrusion Detection and Prevention System with Storage Log Server", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and study of a network intrusion detection system (NIDS) and network intrusion prevention system (NIPS) with syslog server in small and medium size network organization. The purposes of NIDS and NIPS are to prevent, manage and detect the unauthorized access. False negatives are obviously a problem. It is difficult to figure out what you know. In our propose system, we use other components of the security component syslog server. It will show signs of attack that the IDS is not alerting on. Snort is a popular NIDS with signature based rules for detecting of known attacks. For IPS, it is used Snort inline that acts as to protect from untrusted network. So inline prevention system is a solution of network-based security."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "NIDS"}, {"interim": "NIPS"}, {"interim": "Snort"}, {"interim": "Snort inline"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixteenth International Conferences on Computer Applications(ICCA 2018)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Yi, Htay Htay"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-02-22"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/484"}, "item_title": "Security Awareness of Network Infrastructure: Real-time Intrusion Detection and Prevention System with Storage Log Server", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004748", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-04"}, "publish_date": "2019-07-04", "publish_status": "0", "recid": "4748", "relation": {}, "relation_version_is_last": true, "title": ["Security Awareness of Network Infrastructure: Real-time Intrusion Detection and Prevention System with Storage Log Server"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Security Awareness of Network Infrastructure: Real-time Intrusion Detection and Prevention System with Storage Log Server

http://hdl.handle.net/20.500.12678/0000004748
http://hdl.handle.net/20.500.12678/0000004748
dc98f93f-3162-4f66-84ee-4953c52c9a82
1eb7536c-0b36-484c-a661-972e9d0af4f1
Publication type
Article
Upload type
Publication
Title
Title Security Awareness of Network Infrastructure: Real-time Intrusion Detection and Prevention System with Storage Log Server
Language en
Publication date 2018-02-22
Authors
Yi, Htay Htay
Aye, Zin May
Description
In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and study of a network intrusion detection system (NIDS) and network intrusion prevention system (NIPS) with syslog server in small and medium size network organization. The purposes of NIDS and NIPS are to prevent, manage and detect the unauthorized access. False negatives are obviously a problem. It is difficult to figure out what you know. In our propose system, we use other components of the security component syslog server. It will show signs of attack that the IDS is not alerting on. Snort is a popular NIDS with signature based rules for detecting of known attacks. For IPS, it is used Snort inline that acts as to protect from untrusted network. So inline prevention system is a solution of network-based security.
Keywords
NIDS, NIPS, Snort, Snort inline
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/484
Journal articles
Sixteenth International Conferences on Computer Applications(ICCA 2018)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:19:17.676177
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL