Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/3695
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Tuğlular, Tuğkan | en |
dc.contributor.author | Semerci, Hakan | - |
dc.date.accessioned | 2014-07-22T13:52:10Z | - |
dc.date.available | 2014-07-22T13:52:10Z | - |
dc.date.issued | 2004 | en |
dc.identifier.uri | http://hdl.handle.net/11147/3695 | - |
dc.description | Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004 | en |
dc.description | Includes bibliographical references (leaves: 105-108) | en |
dc.description | Text in English; Abstract: Turkish and English | en |
dc.description | viii, 108 leaves | en |
dc.description.abstract | Today, the pace of the technological development and improvements has compelled the development of new and more complex applications. The obligatory of application development in a short time to rapidly changing requirements causes skipping of some stages, mostly the testing stage, in the software development cycle thus, leads to the production of applications with defects. These defects are, later, discovered by intruders to be used to penetrate into computer systems. Current security technologies, such as firewalls, intrusion detection systems, honeypots, network-based antivirus systems, are insufficient to protect systems against those, continuously increasing and rapid-spreading attacks. Intrusion Prevention System (IPS) is a new technology developed to block today.s application-specific, data-driven attacks that spread in the speed of communication. IPS is the evolved and integrated state of the existing technologies; it is not a new approach to network security. In this thesis, IPS products of various computer security appliance developer companies have been analyzed in details. At the end of these analyses, the requirements of network-based IPSs have been identified and an architecture that fits those requirements has been proposed. Also, a sample network-based IPS has been developed by modifying the open source application Snort. | en |
dc.language.iso | en | en_US |
dc.publisher | Izmir Institute of Technology | en |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject.lcc | TK5105.59 S46 2004 | en |
dc.subject.lcsh | Computer networks--Security measures | en |
dc.subject.lcsh | Computer networks--Software | en |
dc.title | Analysis of intrusion prevention methods | en_US |
dc.type | Master Thesis | en_US |
dc.institutionauthor | Semerci, Hakan | - |
dc.department | Thesis (Master)--İzmir Institute of Technology, Computer Engineering | en_US |
dc.relation.publicationcategory | Tez | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Master Thesis | - |
Appears in Collections: | Master Degree / Yüksek Lisans Tezleri |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
T000579.pdf | MasterThesis | 864.67 kB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
216
checked on Nov 18, 2024
Download(s)
68
checked on Nov 18, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.