Implementing honeypot LAN detection
Nowadays, most of attackers try to attack an unsecured network operating system and scanned a subnet by using a tool such as Nmap.The attacker then tried to attempt the server or important network parts through ports on the network.Regarding that situation, it will be cause some of the host on the n...
| Main Author: | Amran, Salleh |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/3692/ http://umpir.ump.edu.my/id/eprint/3692/1/AMRAN_BIN_SALLEH.PDF |
Similar Items
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
LAN searching system
by: Asyran Zarizi, Abdullah
Published: (2010)
by: Asyran Zarizi, Abdullah
Published: (2010)
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005)
by: Abd Talib, Mohd Saiful
Published: (2005)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Network Isolation and Security Using Honeypot
by: Foo, Ce Sheng
Published: (2019)
by: Foo, Ce Sheng
Published: (2019)
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)
by: Azali, Muhamad Rizal
Published: (2005)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
Performance study of the integration between wireless LAN and ATM LAN
by: Liew, Jing Hong
Published: (2005)
by: Liew, Jing Hong
Published: (2005)
Implementing PCA Based on Fault Detection System Based on Selected Important Variables for Continuous Process
by: Mohd Huzaifah, Hamzah
Published: (2013)
by: Mohd Huzaifah, Hamzah
Published: (2013)
Implementing PCA-Based Fault Detection System Based on Selected Imported Variables for Continuous-Based Process
by: Siti Nur Liyana, Ahamd
Published: (2013)
by: Siti Nur Liyana, Ahamd
Published: (2013)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
KAED LAN Room
by: Johari, Mohd Helmi, et al.
Published: (2017)
by: Johari, Mohd Helmi, et al.
Published: (2017)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Visualizing Staff Information System (VSIS) / Wong Mook Lan
by: Wong , Mook Lan
Published: (2001)
by: Wong , Mook Lan
Published: (2001)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
LAN monitoring and management tool (LMMT) / Muhammad Izwan Idris
by: Muhammad Izwan, Idris
Published: (2005)
by: Muhammad Izwan, Idris
Published: (2005)
Local area network (LAN) cable tester using arduino
by: Norimah, Ba'ee
Published: (2014)
by: Norimah, Ba'ee
Published: (2014)
Implementing of ahs for process monitoring evaluation system
by: Fatin Syazwana, Hashim
Published: (2014)
by: Fatin Syazwana, Hashim
Published: (2014)
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
The effectiveness of detection methods in intrusion detection systems / by Hafiz bin Mohd Sarim.
by: Mohd Sarim, Hafiz
Published: (2002)
by: Mohd Sarim, Hafiz
Published: (2002)
Digital implementation of artificial neural networks / Saffith Faycal
by: Faycal, Saffith
Published: (1998)
by: Faycal, Saffith
Published: (1998)
Secure open wireless LAN using point to point protocol
by: Guay, Wei Lin
Published: (2007)
by: Guay, Wei Lin
Published: (2007)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Local area network (LAN) simulator
by: Fong, S.S
Published: (2000)
by: Fong, S.S
Published: (2000)
Integration of cellular network and wireless LAN
by: Indran, Taruna Kugan, et al.
Published: (2021)
by: Indran, Taruna Kugan, et al.
Published: (2021)
Drug tendency detection system
by: Nur Syazanna, Jamaludin
Published: (2011)
by: Nur Syazanna, Jamaludin
Published: (2011)
Implementation of ump course registration system using heuristic method
by: Wong, Wei Leong
Published: (2012)
by: Wong, Wei Leong
Published: (2012)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
RPC/DCOM exploits detection and notification
by: Halim, Ayub
Published: (2005)
by: Halim, Ayub
Published: (2005)
The application of Hough Transform for corner detection
by: Jamaludin, Mohad Fuad
Published: (2006)
by: Jamaludin, Mohad Fuad
Published: (2006)
Reducing honeypot log storage capacity using cron job with PERL-SCRIPT / Nur Muhammad Irfan Abu Hassan
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
by: Irfan Abu Hassan, Nur Muhammad
Published: (2020)
Detecting the phenomenon of strange non-chaotic attractors
by: Oxley, A.
Published: (2010)
by: Oxley, A.
Published: (2010)
Pattern Detection Approach To Boolean Function Classification
by: Mustapha, Muhazam
Published: (2004)
by: Mustapha, Muhazam
Published: (2004)
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
by: Hiromi , Wong, et al.
Published: (2004)
by: Hiromi , Wong, et al.
Published: (2004)
Moving detection using cellular neural network (CNN)
by: Prema Latha, Subramaniam
Published: (2008)
by: Prema Latha, Subramaniam
Published: (2008)
A review on outliers-detection methods for multivariate data
by: Sharifah Sakinah, Syed Abd Mutalib, et al.
Published: (2021)
by: Sharifah Sakinah, Syed Abd Mutalib, et al.
Published: (2021)
Neuro fuzzy classification and detection technique for bioinformatics problems
by: Othman, Mohd. Fauzi, et al.
Published: (2007)
by: Othman, Mohd. Fauzi, et al.
Published: (2007)
VHDL Modeling Of Fetal QRS Complex Detection Algorithm
by: Tan, Hung Khoon
Published: (2004)
by: Tan, Hung Khoon
Published: (2004)
Similar Items
-
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
LAN searching system
by: Asyran Zarizi, Abdullah
Published: (2010) -
Implementing honeypots to fight spammers / Mohd Saiful Abd Talib
by: Abd Talib, Mohd Saiful
Published: (2005) -
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020) -
Network Isolation and Security Using Honeypot
by: Foo, Ce Sheng
Published: (2019)