Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Detection of a network intrusion and manual response without any further action does create a problem known as time gap. Time gap is duration between detection and response. Previous researches have used some approaches like intelligent agent and IDS adoption to solve time gap problem. However, they...
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2005
|
Subjects: | |
Online Access: | http://eprints.utm.my/4069/1/MohdNizamOmarMFSKSM2005.pdf |
_version_ | 1796853668314611712 |
---|---|
author | Omar, Mohd. Nizam |
author_facet | Omar, Mohd. Nizam |
author_sort | Omar, Mohd. Nizam |
collection | ePrints |
description | Detection of a network intrusion and manual response without any further action does create a problem known as time gap. Time gap is duration between detection and response. Previous researches have used some approaches like intelligent agent and IDS adoption to solve time gap problem. However, they do not consider the aspect of intrusion response mechanism. The purpose of this study is to optimize the stepping stone algorithm, which is part of intrusion response mechanism. In this research, special Top-Down methodology has been used to optimize the stepping stone algorithm. It is achieved by analyzing five stepping stone algorithms, in which each algorithm is divided into three main parts. The parts are packet capture, identification and comparison. Among these algorithms, the best approach which produces minimum processing time from each main part has been deployed and tested as a complete stepping stone algorithm. The results from both the optimized approach and existing algorithm are compared. From this comparison, the optimized algorithm gives the best result. The finding of this research suggests that time gap can be reduced through the optimization of the stepping stone algorithm. |
first_indexed | 2024-03-05T18:02:58Z |
format | Thesis |
id | utm.eprints-4069 |
institution | Universiti Teknologi Malaysia - ePrints |
language | English |
last_indexed | 2024-03-05T18:02:58Z |
publishDate | 2005 |
record_format | dspace |
spelling | utm.eprints-40692018-01-15T04:30:13Z http://eprints.utm.my/4069/ Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan Omar, Mohd. Nizam QA75 Electronic computers. Computer science Detection of a network intrusion and manual response without any further action does create a problem known as time gap. Time gap is duration between detection and response. Previous researches have used some approaches like intelligent agent and IDS adoption to solve time gap problem. However, they do not consider the aspect of intrusion response mechanism. The purpose of this study is to optimize the stepping stone algorithm, which is part of intrusion response mechanism. In this research, special Top-Down methodology has been used to optimize the stepping stone algorithm. It is achieved by analyzing five stepping stone algorithms, in which each algorithm is divided into three main parts. The parts are packet capture, identification and comparison. Among these algorithms, the best approach which produces minimum processing time from each main part has been deployed and tested as a complete stepping stone algorithm. The results from both the optimized approach and existing algorithm are compared. From this comparison, the optimized algorithm gives the best result. The finding of this research suggests that time gap can be reduced through the optimization of the stepping stone algorithm. 2005-05 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/4069/1/MohdNizamOmarMFSKSM2005.pdf Omar, Mohd. Nizam (2005) Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. |
spellingShingle | QA75 Electronic computers. Computer science Omar, Mohd. Nizam Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
title | Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
title_full | Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
title_fullStr | Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
title_full_unstemmed | Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
title_short | Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
title_sort | pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan |
topic | QA75 Electronic computers. Computer science |
url | http://eprints.utm.my/4069/1/MohdNizamOmarMFSKSM2005.pdf |
work_keys_str_mv | AT omarmohdnizam pengoptimumanalgoritmapengesananbatuloncatandalamsistempengesananpencerobohan |