This is a Demo Server. Data inside this system is only for test purpose.
 

Analysis of intrusion prevention methods

dc.contributor.advisorTuğlular, Tuğkanen
dc.contributor.authorSemerci, Hakan
dc.contributor.authorTuğlular, Tuğkan
dc.date.accessioned2023-11-13T09:44:48Z
dc.date.available2023-11-13T09:44:48Z
dc.date.issued2004en
dc.departmentComputer Engineeringen_US
dc.descriptionThesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004en
dc.descriptionIncludes bibliographical references (leaves: 105-108)en
dc.descriptionText in English; Abstract: Turkish and Englishen
dc.descriptionviii, 108 leavesen
dc.description.abstractToday, the pace of the technological development and improvements has compelled the development of new and more complex applications. The obligatory of application development in a short time to rapidly changing requirements causes skipping of some stages, mostly the testing stage, in the software development cycle thus, leads to the production of applications with defects. These defects are, later, discovered by intruders to be used to penetrate into computer systems. Current security technologies, such as firewalls, intrusion detection systems, honeypots, network-based antivirus systems, are insufficient to protect systems against those, continuously increasing and rapid-spreading attacks. Intrusion Prevention System (IPS) is a new technology developed to block today.s application-specific, data-driven attacks that spread in the speed of communication. IPS is the evolved and integrated state of the existing technologies; it is not a new approach to network security. In this thesis, IPS products of various computer security appliance developer companies have been analyzed in details. At the end of these analyses, the requirements of network-based IPSs have been identified and an architecture that fits those requirements has been proposed. Also, a sample network-based IPS has been developed by modifying the open source application Snort.en
dc.identifier.urihttp://standard-demo.gcris.com/handle/123456789/5243
dc.institutionauthorSemerci, Hakan
dc.language.isoenen_US
dc.oaire.dateofacceptance2004-01-01
dc.oaire.impulse0
dc.oaire.influence2.9837197E-9
dc.oaire.influence_alt0
dc.oaire.is_greentrue
dc.oaire.isindiamondjournalfalse
dc.oaire.keywordsTK5105.59 S46 2004
dc.oaire.keywordsComputer Engineering and Computer Science and Control
dc.oaire.keywordsBilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol
dc.oaire.popularity3.9385506E-10
dc.oaire.popularity_alt0.0
dc.oaire.publiclyfundedfalse
dc.publisherIzmir Institute of Technologyen
dc.relation.publicationcategoryTezen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subject.lccTK5105.59 S46 2004en
dc.subject.lcshComputer networks--Security measuresen
dc.subject.lcshComputer networks--Softwareen
dc.titleAnalysis of intrusion prevention methodsen_US
dc.typeMaster Thesisen_US
dspace.entity.typePublication
relation.isAuthorOfPublication16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isAuthorOfPublication.latestForDiscovery16066bf2-f189-4d4b-91e8-3fc6cb495163

Files

Collections