Show simple item record

dc.contributor.author Weeraratne, PPDSC
dc.date.accessioned 2014-08-20T14:08:32Z
dc.date.available 2014-08-20T14:08:32Z
dc.date.issued 2014-08-20
dc.identifier.uri http://dl.lib.mrt.ac.lk/handle/123/10567
dc.description.abstract The rapid proliferation of Information System networks and IS an application has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. There are several kinds of intruders that can affect to company information system. They may be inside or outside users. Sometimes it may be authorized or unauthorized users. These intruders slow down high-speed internet connection as well as high performance and expensive IT resources. Because they are looking around the world for idle IT resources for running their processor inside others resources. The network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defence. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. In this research, examine the vulnerabilities of networks and say that we must include intrusion detection in the security architecture for computing environment. We have showed such architecture and evaluated key mechanisms in this architecture such as applying sensors to intrusion detection, anomaly detection and misuse detection for ad-hoc networks. en_US
dc.language.iso en en_US
dc.title Intrusion detection system to protect network resources en_US
dc.type Thesis-Abstract en_US
dc.identifier.faculty IT en_US
dc.identifier.degree Master of Science in Information Technology en_US
dc.identifier.department Information Technology en_US
dc.date.accept 2011
dc.identifier.accno 102515 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record