Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
This project is using a honeypot as a tool to detect internal network attack at Faculty of Information Technology and Quantitative Science, (FTMSK). The purpose of this project is to know how secure the FTMSK internal network is. Honeypots are used to detect attack that enables the automated dete...
| Main Author: | Azali, Muhamad Rizal |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/1695/ |
Similar Items
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Colour blind test using Ishihara method / Nor Haryati Azali
by: Azali, Nor Haryati
Published: (2005)
by: Azali, Nor Haryati
Published: (2005)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005)
by: Abd Talib, Mohd Saiful
Published: (2005)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Parasitology encyclopedia / Edli Rizal Johari
by: Edli Rizal , Johari
Published: (2003)
by: Edli Rizal , Johari
Published: (2003)
Online nota kuliah / Shah Rizal Othman Ali
by: Shah Rizal, Othman Ali
Published: (2003)
by: Shah Rizal, Othman Ali
Published: (2003)
FTMSK online student support system (FOSS) / Karno Omar
by: Omar, Karno
Published: (2005)
by: Omar, Karno
Published: (2005)
FTMSK Resources Scheduling System (FRSS) / Maria Kamaruddin @ Yin
by: Kamaruddin @ Yin, Maria
Published: (2005)
by: Kamaruddin @ Yin, Maria
Published: (2005)
Implementing honeypot LAN detection
by: Amran, Salleh
Published: (2005)
by: Amran, Salleh
Published: (2005)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Computer risk profiling system for FTMSK computer's lab / Yusaniah Yusof
by: Yusof, Yusaniah
Published: (2007)
by: Yusof, Yusaniah
Published: (2007)
i-Learn portal: The perception among FTMSK students / Norhayati Ishak
by: Ishak, Norhayati
Published: (2006)
by: Ishak, Norhayati
Published: (2006)
Traffic analysis for video streaming : a study in FTMSK
/ Diana Mohd Alwi
by: Mohd Alwi, Diana
Published: (2005)
by: Mohd Alwi, Diana
Published: (2005)
Wireless security assessment on the FTMSK2 building / Zainurzaman Mah Sangit @ Kasmat
by: Mah Sangit @ Kasmat, Zainurzaman
Published: (2007)
by: Mah Sangit @ Kasmat, Zainurzaman
Published: (2007)
The service quality of computer laboratory's facility in FTMSK : student's satisfaction / Mazliani Arsad
by: Arsad, Mazliani
Published: (2006)
by: Arsad, Mazliani
Published: (2006)
Design and development of FTMSK alumni information repository / Herojer Asoon
by: Asoon, Herojer
Published: (2006)
by: Asoon, Herojer
Published: (2006)
Development of online appointment system using forward chaining algorithm for Student and lecturer in FTMSK / Sharizal Sharif
by: Sharif, Sharizal
Published: (2007)
by: Sharif, Sharizal
Published: (2007)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Knowledgepoint : a study on the usability of the user interface for FTMSK'S knowledge portal / Sharliza Kamarulzaman
by: Kamarulzaman, Sharliza
Published: (2005)
by: Kamarulzaman, Sharliza
Published: (2005)
Development of online facility management system for FTMSK computer center / Husni Ahmad Hanafi
by: Ahmad Hanafi, Husni
Published: (2007)
by: Ahmad Hanafi, Husni
Published: (2007)
Awareness of e-learning drawbacks among FTMSK students / Zool Fadly Arasat (Arshad)
by: Arasat (Arshad), Zool Fadly
Published: (2007)
by: Arasat (Arshad), Zool Fadly
Published: (2007)
Development of computer inventory system using automatic data gathering and barcode for FTMSK / Mohd Hafidzi Mat Yasin
by: Mat Yasin, Mohd Hafidzi
Published: (2007)
by: Mat Yasin, Mohd Hafidzi
Published: (2007)
Perceived issue in the possible implementation of RFID tagging on FTMSK student card / Caroline Annie Jerry
by: Jerry, Caroline Annie
Published: (2005)
by: Jerry, Caroline Annie
Published: (2005)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
A proposed framework for FTMSK alumni / Fazleen Noorhuda Abdul Majid
by: Abdul Majid, Fazleen Noorhuda
Published: (2005)
by: Abdul Majid, Fazleen Noorhuda
Published: (2005)
Reducing honeypot log storage capacity using cron job with PERL-SCRIPT / Nur Muhammad Irfan Abu Hassan
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
Effect of flow rate on development of microstructure by MIG welding / Muhamad Rizal Khalid
by: Khalid, Muhamad Rizal
Published: (2004)
by: Khalid, Muhamad Rizal
Published: (2004)
A study on one way hashing function and its application for
FTMSK webmail / Noor Hasimah Ibrahim Teo
by: Ibrahim Teo, Noor Hasimah
Published: (2005)
by: Ibrahim Teo, Noor Hasimah
Published: (2005)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
The readiness of FTMSK students towards the implementation of mobile learning in learning C++ programming language /
Khairu Faradilla Mohd Zaini
by: Mohd Zaini, Khairu Faradilla
Published: (2007)
by: Mohd Zaini, Khairu Faradilla
Published: (2007)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
A framework-based approach towards development of online research progress tracking system at FTMSK / Khairul Ashraf Basul Hak
by: Basul Hak, Khairul Ashraf
Published: (2006)
by: Basul Hak, Khairul Ashraf
Published: (2006)
Rekabentuk cip pemamtapatan data / Shah Rizal Ismail
by: Shah Rizal , Ismail
Published: (2000)
by: Shah Rizal , Ismail
Published: (2000)
Animal recognition application using Kohonen
Feature Map / Muhamad Syafiq Nordin
by: Nordin, Muhamad Syafiq
Published: (2007)
by: Nordin, Muhamad Syafiq
Published: (2007)
Similar Items
-
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Colour blind test using Ishihara method / Nor Haryati Azali
by: Azali, Nor Haryati
Published: (2005) -
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005) -
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)