Building an IDS using OPNET
نویسندگان
چکیده
Influenced by recent international terrorist attacks, security has become a very important matter. Government is investing a great amount of money to improve security, as big companies do. One of the most important security fields, where part of the security investment is focused on, is information security. All networks and computer systems where information is stored are becoming an important research field. This field is where this project takes place. The most common network security automated components are Firewalls, Intrusion Detection Systems (IDS) and Honeypot Systems among others. This project’s objective is to implement an IDS for OPNET, which can be used to simulate how it works in a corporate network.
منابع مشابه
An Experiment for Estimating Database Latency for Mobile Systems*
As ubiquitous computing begins to become a reality, the problem of estimating database performance metrics, such as database latency between mobile systems or database latencies among fixed and mobile systems, will become an ever more important issue for network engineers. The problem of estimating database performance metrics, especially latency for mobile systems, is of particular concern to ...
متن کاملSimulation of TinyOS Wireless Sensor Networks Using OPNET
Many of the sensors finding their way into sensor networks run a lightweight operating system developed at U.C. Berkeley called TinyOS. This open-source operating system, designed specifically for highly-constrained wireless devices, enables building a variety of applications using highly modular code. Over one hundred groups worldwide, and several company products, use TinyOS. Our main contrib...
متن کاملAn Experimental Study: Using a Simulator Tool for Modelling Campus Based Wireless Local Area Network
A network whose interconnections between nodes are implemented without using wires is referred to as wireless network and is usually related to a telecommunication network. As related to wired local area network, wireless channels are error-prone. Performance study and optimization of Wireless Local Area Network (WLAN) becomes more essential as its gaining popularity. For performance modelling ...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملA Frequency-Based Approach to Intrusion Detection
Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS) are typically only effective in defending known intrusion types using their signatu...
متن کامل