English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90120/105278 (86%)
Visitors : 8907590      Online Users : 600
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/3943

    Title: Design and Implementation of Intrusion Detection System Based on IP/VPN for Enterprise
    Authors: Wu Cheng Lun
    Contributors: Department of Computer Science and Information Engineering
    Keywords: IDS(Intrusion Detection System);Vulnerability Assessment;Snort
    Date: 2005
    Issue Date: 2009-11-18 21:13:16 (UTC+8)
    Publisher: Asia University
    Abstract: Referring to the main relevant topics of information safety in enterprise's network of research, a lot of enterprises has adopted IP/VPN (IP Virtual Private Network) way to carry on the information transmission. Although the transmission by the above method are not invaded by the external hacker, but the most invaders or hackers are most coming from employees of the companies according the facts or practical experience. the reasons are the employee knowing the host computer address, and where information data are put, or the staff do not understand safely about information . Therefore it is not conscientious that the system is infected or Trojan horse-planted, which will cause the management burden, and even influence enterprise's operation due to the security loophole.

    This thesis will hopefully make customized IDS (Intrusion Detection System) which will satisfy the company requirement for internal operation, provide real-time intrusion information to detect if the system is intruded, generate a lot of resourceful reports to top managers by using user-friendly interface, and offer the historical data to check and verify for the future .
    Appears in Collections:[資訊工程學系] 博碩士論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback