Computer network intrusion detection software development

Shaiful Jahari Hashim, Kasmiran Jumari, Mahamod Ismail

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Recent proliferation of computer network usage for business and communication has witnessed an alarming rate of intrusion. The phenomenon is a grave concern in academic environment since universities seldom have tight security measures and the high bandwidth available make them interesting targets as attack relay hosts. The software development process adopted open source approaches where a simple open source implementation of network intrusion detection is improved to tailor the needs in Universiti Kebangsaan Malaysia campus. The working prototype is then tested on real life implementation in the university environment for detecting, logging and alerting computer network intrusion.

Original languageEnglish
Title of host publicationIEEE Region 10 Annual International Conference, Proceedings/TENCON
Volume3
Publication statusPublished - 2000
Event2000 TENCON Proceedings - Kuala Lumpur, Malaysia
Duration: 24 Sep 200027 Sep 2000

Other

Other2000 TENCON Proceedings
CityKuala Lumpur, Malaysia
Period24/9/0027/9/00

Fingerprint

Intrusion detection
Computer networks
Software engineering
Bandwidth
Communication
Industry

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Hashim, S. J., Jumari, K., & Ismail, M. (2000). Computer network intrusion detection software development. In IEEE Region 10 Annual International Conference, Proceedings/TENCON (Vol. 3)

Computer network intrusion detection software development. / Hashim, Shaiful Jahari; Jumari, Kasmiran; Ismail, Mahamod.

IEEE Region 10 Annual International Conference, Proceedings/TENCON. Vol. 3 2000.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hashim, SJ, Jumari, K & Ismail, M 2000, Computer network intrusion detection software development. in IEEE Region 10 Annual International Conference, Proceedings/TENCON. vol. 3, 2000 TENCON Proceedings, Kuala Lumpur, Malaysia, 24/9/00.
Hashim SJ, Jumari K, Ismail M. Computer network intrusion detection software development. In IEEE Region 10 Annual International Conference, Proceedings/TENCON. Vol. 3. 2000
Hashim, Shaiful Jahari ; Jumari, Kasmiran ; Ismail, Mahamod. / Computer network intrusion detection software development. IEEE Region 10 Annual International Conference, Proceedings/TENCON. Vol. 3 2000.
@inproceedings{3395bf7f4a5a4c8b9530766f3fdaaa7e,
title = "Computer network intrusion detection software development",
abstract = "Recent proliferation of computer network usage for business and communication has witnessed an alarming rate of intrusion. The phenomenon is a grave concern in academic environment since universities seldom have tight security measures and the high bandwidth available make them interesting targets as attack relay hosts. The software development process adopted open source approaches where a simple open source implementation of network intrusion detection is improved to tailor the needs in Universiti Kebangsaan Malaysia campus. The working prototype is then tested on real life implementation in the university environment for detecting, logging and alerting computer network intrusion.",
author = "Hashim, {Shaiful Jahari} and Kasmiran Jumari and Mahamod Ismail",
year = "2000",
language = "English",
volume = "3",
booktitle = "IEEE Region 10 Annual International Conference, Proceedings/TENCON",

}

TY - GEN

T1 - Computer network intrusion detection software development

AU - Hashim, Shaiful Jahari

AU - Jumari, Kasmiran

AU - Ismail, Mahamod

PY - 2000

Y1 - 2000

N2 - Recent proliferation of computer network usage for business and communication has witnessed an alarming rate of intrusion. The phenomenon is a grave concern in academic environment since universities seldom have tight security measures and the high bandwidth available make them interesting targets as attack relay hosts. The software development process adopted open source approaches where a simple open source implementation of network intrusion detection is improved to tailor the needs in Universiti Kebangsaan Malaysia campus. The working prototype is then tested on real life implementation in the university environment for detecting, logging and alerting computer network intrusion.

AB - Recent proliferation of computer network usage for business and communication has witnessed an alarming rate of intrusion. The phenomenon is a grave concern in academic environment since universities seldom have tight security measures and the high bandwidth available make them interesting targets as attack relay hosts. The software development process adopted open source approaches where a simple open source implementation of network intrusion detection is improved to tailor the needs in Universiti Kebangsaan Malaysia campus. The working prototype is then tested on real life implementation in the university environment for detecting, logging and alerting computer network intrusion.

UR - http://www.scopus.com/inward/record.url?scp=0034428060&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0034428060&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:0034428060

VL - 3

BT - IEEE Region 10 Annual International Conference, Proceedings/TENCON

ER -