Building an IDS using OPNET

نویسندگان

  • Guiomar Corral
  • Agustin Zaballos
  • Jaume Abella
  • Carlos Morales
چکیده

Influenced by recent international terrorist attacks, security has become a very important matter. Government is investing a great amount of money to improve security, as big companies do. One of the most important security fields, where part of the security investment is focused on, is information security. All networks and computer systems where information is stored are becoming an important research field. This field is where this project takes place. The most common network security automated components are Firewalls, Intrusion Detection Systems (IDS) and Honeypot Systems among others. This project’s objective is to implement an IDS for OPNET, which can be used to simulate how it works in a corporate network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Experiment for Estimating Database Latency for Mobile Systems*

As ubiquitous computing begins to become a reality, the problem of estimating database performance metrics, such as database latency between mobile systems or database latencies among fixed and mobile systems, will become an ever more important issue for network engineers. The problem of estimating database performance metrics, especially latency for mobile systems, is of particular concern to ...

متن کامل

Simulation of TinyOS Wireless Sensor Networks Using OPNET

Many of the sensors finding their way into sensor networks run a lightweight operating system developed at U.C. Berkeley called TinyOS. This open-source operating system, designed specifically for highly-constrained wireless devices, enables building a variety of applications using highly modular code. Over one hundred groups worldwide, and several company products, use TinyOS. Our main contrib...

متن کامل

An Experimental Study: Using a Simulator Tool for Modelling Campus Based Wireless Local Area Network

A network whose interconnections between nodes are implemented without using wires is referred to as wireless network and is usually related to a telecommunication network. As related to wired local area network, wireless channels are error-prone. Performance study and optimization of Wireless Local Area Network (WLAN) becomes more essential as its gaining popularity. For performance modelling ...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

A Frequency-Based Approach to Intrusion Detection

Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS) are typically only effective in defending known intrusion types using their signatu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005