Security monitor using Java mobile agent
This report investigates at how Java and Mobile Agent technology can be used to implement a generic distributed security monitor system for a large and distributed network. The proposed system consists of 4 sub-systems, namely, Client, Intelligent Server, Repository and Mobile Agent. As the design i...
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/4569 |
_version_ | 1811696965827690496 |
---|---|
author | Lee, Chit Boon. |
author2 | Tan, Daniel Tiong Hok |
author_facet | Tan, Daniel Tiong Hok Lee, Chit Boon. |
author_sort | Lee, Chit Boon. |
collection | NTU |
description | This report investigates at how Java and Mobile Agent technology can be used to implement a generic distributed security monitor system for a large and distributed network. The proposed system consists of 4 sub-systems, namely, Client, Intelligent Server, Repository and Mobile Agent. As the design is component-based, new component or functionality added with minimal impact on the existing component. It is important for a good security monitor system to be updated regularly so that it is able to detect new security threat. |
first_indexed | 2024-10-01T07:47:45Z |
format | Thesis |
id | ntu-10356/4569 |
institution | Nanyang Technological University |
last_indexed | 2024-10-01T07:47:45Z |
publishDate | 2008 |
record_format | dspace |
spelling | ntu-10356/45692023-07-04T15:21:47Z Security monitor using Java mobile agent Lee, Chit Boon. Tan, Daniel Tiong Hok School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems This report investigates at how Java and Mobile Agent technology can be used to implement a generic distributed security monitor system for a large and distributed network. The proposed system consists of 4 sub-systems, namely, Client, Intelligent Server, Repository and Mobile Agent. As the design is component-based, new component or functionality added with minimal impact on the existing component. It is important for a good security monitor system to be updated regularly so that it is able to detect new security threat. Master of Engineering 2008-09-17T09:54:30Z 2008-09-17T09:54:30Z 2000 2000 Thesis http://hdl.handle.net/10356/4569 Nanyang Technological University application/pdf |
spellingShingle | DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Lee, Chit Boon. Security monitor using Java mobile agent |
title | Security monitor using Java mobile agent |
title_full | Security monitor using Java mobile agent |
title_fullStr | Security monitor using Java mobile agent |
title_full_unstemmed | Security monitor using Java mobile agent |
title_short | Security monitor using Java mobile agent |
title_sort | security monitor using java mobile agent |
topic | DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
url | http://hdl.handle.net/10356/4569 |
work_keys_str_mv | AT leechitboon securitymonitorusingjavamobileagent |