- References
- 1. Abbasi, A., Zahedi, F. “., Zeng, D., Chen, Y., Chen, H., & Nunamaker, J. F. (n.d.).
- 2. Advanced Threat Protection Buyer's Guide. (2016, 5 10). Computer Weekly, pp. p1-18. 18p.
- 3. Ashish Malik, A. K. (2015). A Comparative Analysis of Network Topologies in Wired Network. IUP Journal of Telecommunications Vol 7 Issue 4, p7-15.
- 4. BarnYard2. (2017, July 21). Retrieved from http://www.forensicswiki.org/wiki/Barnyard2: http://www.forensicswiki.org/wiki/Barnyard2
- 5. GFI Software. (2017, 6 18). Security Threats: A guide for small and Medium businesses. Retrieved from www.gfi.com: www.gfi.com/whitepapers/security_threats_SMBs.pdf
- 6. Gupta, A., & Zhdanov, D. (2012). GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE. MIS Quarterly, p1109-A7. 29p.
- 7. Hassen Sallay, S. B. (2015). Intrusion detection alert management for high-speed networks: current researches and applications. John Wiley & Sons, Ltd.
- 8. https://websnort.readthedocs.io/en/latest/. (2017, July 23). Retrieved from https://websnort.readthedocs.io/en/latest/: https://websnort.readthedocs.io/en/latest/
- 9. Internal Segmentation Firewall. (2016, 5 10). Computer Weekly, pp. p1-12, 12p.
- 10. Jr., G. S., Goyal, S., & Singh, G. (2014). Intrusion Detection Using Network Monitoring Tools. The IUP Journal of Computer Sciences, Vol. IX, No. 4,, pg. 45-58.
- 11. Kismet Wireless. (2017, July 21). Retrieved from https://www.kismetwireless.net/: https://www.kismetwireless.net/
- 12. Lazarevic, A., Kumar, V., & Srivastava, J. (2005). Intrusion Detection: A Survey. In A. Lazarevic, V. Kumar, & J. Srivastava, Managing Cyber Threats: Issues, Approaches, and Challenges (pp. 19-78). Boston, Ma: Springer US.
- 13. McNab, C. (2008). Network Security Assesment, Edited by Tatiana Apandi; 2nd ed. Sebastopol: O'Reilly Media.
- 14. Mohammad Sazzadul Hoque, M. A. (2012). An Implementation of Intrusion Detection System Using Genetic Algorithm. International Journal of Network Security & Its Applications, Volume 4, Number 2, pages 109-120.
- 15. Obaidat, M. a. (2007). Security of e-Systems and Computer Networks. New York: Cambridge University Press.
- 16. Perez, A. (2014). Network Security. London, [England]; Hoboken, New Jersey;: ISTE Limited : John Wiley & Sons.
- 17. Pfleeger, C. a. (2007). Security In Computing. 4th Ed. Boston: Pearson Education, Inc.
- 18. Raspbery Pi Foundation. (2017, Febuary 1). Introducing the Raspberry Pi Zero W. Retrieved from raspberrypi.org: https://www.raspberrypi.org/magpi/pi-zero-w/
- 19. Rouse, M. (2014, 11 1). http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. Retrieved from http://whatis.techtarget.com: http://whatis.techtarget.com
- 20. Schifreen, R. (2006). Defeating the Hacker: A Non-Technical Guide to IT Security. West Sussex: John Wiley & Sons.
- 21. Securing Your Network and Application Infrastructure. (2016, 5 10). Computer Weekly, pp. p2-62, 63p.
- 22. Snort. (2017, July 23). Retrieved from https://www.snort.org/: https://www.snort.org/
- 23. Snort FAQ. (2017, July 23). Retrieved from snort.org: https://www.snort.org/faq/what-is-snort
- 24. Steinberg, J. (2015). Official (ISC)2 Guide to the CICCP-ISSP CBK. 2nd ed. Boca Raton: Taylor & Francis Group, LLC.
- 25. Syed, M. R., & Kar, D. C. (2011). Network Security, Administration, and Management : Advancing Technology and Practice. Hershey Pa: IGI Global.
- 26. Timofte, J. (2008). Intrusion Detection using Open Source Tools. Revista Informatica Economică , 75-79.
- 27. Vacca, J. R. (2014). Network and System Security. Amsterdam: Syngress.
- 28. Wang, C. &. (2007). Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats. Hoboken: Wiley.
- 29. WireShark.org. (2017, July 23). Retrieved from WireShark.org: https://www.wireshark.org/
A group blog covering the subject of the Internet of Things, and micro computing.
Class Links
Wednesday, May 2, 2018
a list of references....
Here is a listing of references for the IDS project..
Subscribe to:
Post Comments (Atom)
Wow, nice long read!
ReplyDeletePrivacy is very important, It's important for people to learn how to protect themselves.
In today’s world, data breaches, threats, attacks and intrusions are becoming highly sophisticated. Cyber criminals and hackers come up with new methods of gaining access to business and home networks, making a multi-tiered approach to network security an urgent necessity. An Intrusion Detection System (IDS) is, therefore, the most important tool to be deployed to defend the network against the high tech attacks that emerge daily. An IDS, which is a network security tool, is built to detect vulnerability exploits against a target application or computer. It is regarded as a high-end network device or software application that assists the network or systems administrators in monitoring the network or system for all sorts of malicious activities or threats. Any unusual activity is reported to the administrator using a security information and event management (SIEM) system.
There are a wide variety of IDSs available, ranging from antivirus to hierarchical systems, which monitor network traffic. The most common ones are listed below.
The most important is finding a protection level and budget that you are comfortable with.
Ngozi
Nayyar, A. (2017, April 10). The Best Open Source Network Intrusion Detection Tools.