dc.contributor.advisor |
Outsios, Evangelos |
|
dc.contributor.advisor |
Ούτσιος, Ευάγγελος |
|
dc.contributor.author |
Kokkinos, Dimitrios |
|
dc.contributor.author |
Κόκκινος, Δημήτριος |
|
dc.date.accessioned |
2016-09-08T09:17:33Z |
|
dc.date.available |
2016-09-08T09:17:33Z |
|
dc.date.issued |
2016-07 |
|
dc.identifier.uri |
http://apothesis.teicm.gr/xmlui/handle/123456789/2596 |
|
dc.description |
Το πλήρες κείμενο της εργασίας ΔΕΝ είναι διαθέσιμο |
el |
dc.description.abstract |
This master thesis is about the technology of Intrusion Detection Systems. Nowadays more than ever the digital world of the internet is a hostile environment. The need for protection has been dramatically increased . Many intrusion-detection systems exist. To identify intrusions the misuse detection methods utilize patterns of well-known attacks or weak spots of the system. Attack scenarios are be translated into the sequences of audit events they generate or into patterns of data that can be sought in the audit trail generated by the system. This technique allows a very efficient implementation. The purpose of this thesis is to overview, examine and test intrusion detection systems . Their ability to detect intrusions will be tested in a home network with two personal computers and a few virtual machines .Tests will take place in windows and linux environments . We will attack the network with network scanning tools like nmap or simulate attacks generating network traffic in order to see how the IDS reacts. The results from these tests will be discussed and analyzed to provide a general view of IDS technology. Also we are going to examine some output-plugins applications which provide a visual representation of the IDS’s results. |
en |
dc.format.extent |
112 |
el |
dc.language.iso |
el |
el |
dc.publisher |
Τ.Ε.Ι. Κεντρικής Μακεδονίας |
el |
dc.rights |
Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 4.0 Διεθνές |
|
dc.rights.uri |
http://creativecommons.org/licenses/by-nc-nd/4.0/deed.el |
|
dc.subject |
TEICM::ΔΙΚΤΥΑ ΗΛΕΚΤΡΟΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ::ΔΙΚΤΥΑ ΗΛΕΚΤΡΟΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ -- ΜΕΤΡΑ ΑΣΦΑΛΕΙΑΣ |
el |
dc.subject |
TEICM::ΠΡΟΣΤΑΣΙΑ ΔΕΔΟΜΕΝΩΝ::ΑΣΦΑΛΕΙΑ ΗΛΕΚΤΡΟΝΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ |
el |
dc.subject |
TEICM::ΠΡΟΣΤΑΣΙΑ ΔΕΔΟΜΕΝΩΝ |
el |
dc.subject.ddc |
005.8 |
el |
dc.title |
Intrusion Detection System ,from network data using prototype recognition techniques |
el |
dc.type |
Διπλωματική εργασία |
|
dc.contributor.department |
Σχολή Τεχνολογικών Εφαρμογών, Τμήμα Μηχανικών Πληροφορικής Τ.Ε. |
el |
dc.contributor.master |
Master’s Degree in Communication and Information Systems |
el |
dc.heal.publisherID |
teiser |
|
dc.subject.keyword |
Intrusion Detection Systems |
el |
dc.subject.keyword |
Διαδίκτυο και μέτρα ασφάλειας |
el |
dc.subject.keyword |
Output-plugins applications |
el |
dc.subject.keyword |
Network |
el |