Intrusion notification via SMS / Aziz Kasmir Mat Yunos
This project is aimed to have an NIDS (Snort) intrusion notification via SMS in the real time. In order to achieve the project goals, the logdog Perl script have to be added new configuration to support snort log parsing and send SMS to Gnokii SMS gateway. Snort rule also have to be reconfigure t...
| Main Author: | Mat Yunos, Aziz Kasmir |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Information Technology and Quantitative Science
2006
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/846/ |
Similar Items
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
E-mail alert via SMS / Mohd Fadhil Ab Rahman
by: Ab Rahman, Mohd Fadhil
Published: (2005)
by: Ab Rahman, Mohd Fadhil
Published: (2005)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Experimenting text input methods in mobile application / Anuar Mohd Yusof
by: Mohd Yusof, Anuar
Published: (2005)
by: Mohd Yusof, Anuar
Published: (2005)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Taiping zoo and night safari navigation using mobile application / Siti Norasmawati Kadir
by: Siti Norasmawati, Kadir
Published: (2016)
by: Siti Norasmawati, Kadir
Published: (2016)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
M-Clinic: mobile application system for UiTMT Health Center equipment reservation / Mohd Ridzuan Mat Yassin
by: Mat Yassin, Mohd Ridzuan
Published: (2012)
by: Mat Yassin, Mohd Ridzuan
Published: (2012)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
by: Cheong, Dianne L.M., et al.
Published: (2006)
by: Cheong, Dianne L.M., et al.
Published: (2006)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Task alert through short message service (SMS) case study: Penang Water Authority / Izja Aznie Jelani
by: Jelani, Izja Aznie
Published: (2006)
by: Jelani, Izja Aznie
Published: (2006)
MSN Messenger goes Live
Published: (2008)
Published: (2008)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Active8! Technology-based intervention to promote physical activity in hospital employees
by: Blake, Holly, et al.
Published: (2017)
by: Blake, Holly, et al.
Published: (2017)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Patterns of Electronic Mail Discourse in Two Malaysian Organisations
by: Habil, Hadina
Published: (2003)
by: Habil, Hadina
Published: (2003)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Differences in the Linguistic Features of Text Messages send with an Alphanumeric Multi-Press Keypad Mobile Phone versus a Full Keypad Touchscreen Smartphone
by: Kent, Sarah, et al.
Published: (2012)
by: Kent, Sarah, et al.
Published: (2012)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
The use of social media, e-mail and instant messaging as the predictors of an employee’s work performance / Ainaa Idayu Iskandar, Ahmad Fadhly Arham and Najiah Shohaime
by: Iskandar, Ainaa Idayu, et al.
Published: (2017)
by: Iskandar, Ainaa Idayu, et al.
Published: (2017)
Alert notification via SMS / Zudiana Zainuddin
by: Zainuddin, Zudiana
Published: (2006)
by: Zainuddin, Zudiana
Published: (2006)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE
by: Owais, Faizan
Published: (2008)
by: Owais, Faizan
Published: (2008)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Motive8!: feasibility of a text messaging intervention to promote physical activity in knee osteoarthritis
by: Blake, Holly, et al.
Published: (2015)
by: Blake, Holly, et al.
Published: (2015)
Discursive practices and creation of identity using the mobile phone
by: Lloyd, Clare, et al.
Published: (2010)
by: Lloyd, Clare, et al.
Published: (2010)
The development of driving school web based system with appointment notification via SMS / Fadhlil Syafiq Bahari
by: Bahari, Fadhlil Syafiq
Published: (2007)
by: Bahari, Fadhlil Syafiq
Published: (2007)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Similar Items
-
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010) -
E-mail alert via SMS / Mohd Fadhil Ab Rahman
by: Ab Rahman, Mohd Fadhil
Published: (2005) -
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016) -
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020) -
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)