Detecting and preventing unauthorised computer access on a physical network system
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/9572/1/SuhaizaMdSaadMFS2008.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.9572 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.95722018-07-19T01:53:00Z Detecting and preventing unauthorised computer access on a physical network system 2008-06 Mohd. Shariff, Muhammad Reza QA75 Electronic computers. Computer science Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. A hacker may enter the network by inserting a cable to an active port which is not secure within the building. Sometimes system administrator does not have the time to check on every connection that are active and not in use on a daily basis. This may lead to an intrusion that will compromise the network system. On the other hand if several virus outbreaks happen at a corporate network system the network system maybe halted or collapse thus paralyzing the whole network infrastructure. A solution to block any computers that had been infested by virus is needed. The purpose of this research is to build an application that eliminate and prevent any illegal workstation from entering the network. These illegal workstation includes workstation that has no rights to enter the network, workstation that are not owned by the company or staffs, and workstation that has been infected by virus or have malicious intention to the corporate network. The system shall stop any workstation by determining the IP address or MAC address or both that is unknown to the system administrator or had been infected by viruses from the network. This is to ensure that these workstations shall not be able to attack the network system or spreading viruses throughout the network. With the system, system administrators do not need to check on every workstation on the corporate network for threats thus minimize manpower. 2008-06 Thesis http://eprints.utm.my/id/eprint/9572/ http://eprints.utm.my/id/eprint/9572/1/SuhaizaMdSaadMFS2008.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information System Faculty of Computer Science and Information System 1. Cappellli, D., Morre A., and Shimeall, T. (2005). Common Sense Guide to Prevention and Detection Of Insider Threats. Retrieved December 15, 2006, from http://www.uscert. gov/reading_room/prevent_detect_insiderthreat0504.pdf , US-GCERT 2. Einwecher, N. (2005, March 13). Preventing and Detecting Insider Attacks Using IDS. Retrieved December 15, 2006, from http://www.securityfocus.com/infocus/1558 3. CERT® Advisory. (2004, October 23). CA-2003-20 W32/Blaster worm, Retrieved December 15, 2006, from http://www.cert.org/advisories/CA- 2003-20.html 4. Szor, P. (2005). The Art of Computer, Virus Research and Defense.(1st Edition) New Jersey, USA : Addison-Wesley Symantec Press 5. Stevens, W. R. (1994). TCP/IP Illustrated, Volume 1, The Protocols. (1st Edition) Massachusetts, USA : Addison-Wesley Longman 6. Black, U. [1994]. TCP/IP & Related Protocols. (2nd Edition) New York, USA : McGraw Hill International 7. IPScan (2005). Secure IP Address Management Layer 2 Network Access Control. [Brochure]. South Korea. Viascope 8. Pressman, R. S. [1997]. Software Engineering, A Practitioner’s Approach. (4th Edition) New York, USA: McGraw-Hill 9. Schiffman, M. D. [2003]. Building Open Source Network Security Tools, (1st Edition) Indiana USA, Wiley Publishing |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
QA75 Electronic computers Computer science |
spellingShingle |
QA75 Electronic computers Computer science Mohd. Shariff, Muhammad Reza Detecting and preventing unauthorised computer access on a physical network system |
description |
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. A hacker may enter the network by inserting a cable to an active port which is not secure within the building. Sometimes system administrator does not have the time to check on every connection that are active and not in use on a daily basis. This may lead to an intrusion that will compromise the network system. On the other hand if several virus outbreaks happen at a corporate network system the network system maybe halted or collapse thus paralyzing the whole network infrastructure. A solution to block any computers that had been infested by virus is needed. The purpose of this research is to build an application that eliminate and prevent any illegal workstation from entering the network. These illegal workstation includes workstation that has no rights to enter the network, workstation that are not owned by the company or staffs, and workstation that has been infected by virus or have malicious intention to the corporate network. The system shall stop any workstation by determining the IP address or MAC address or both that is unknown to the system administrator or had been infected by viruses from the network. This is to ensure that these workstations shall not be able to attack the network system or spreading viruses throughout the network. With the system, system administrators do not need to check on every workstation on the corporate network for threats thus minimize manpower. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Mohd. Shariff, Muhammad Reza |
author_facet |
Mohd. Shariff, Muhammad Reza |
author_sort |
Mohd. Shariff, Muhammad Reza |
title |
Detecting and preventing unauthorised computer access on a physical network system |
title_short |
Detecting and preventing unauthorised computer access on a physical network system |
title_full |
Detecting and preventing unauthorised computer access on a physical network system |
title_fullStr |
Detecting and preventing unauthorised computer access on a physical network system |
title_full_unstemmed |
Detecting and preventing unauthorised computer access on a physical network system |
title_sort |
detecting and preventing unauthorised computer access on a physical network system |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computer Science and Information System |
granting_department |
Faculty of Computer Science and Information System |
publishDate |
2008 |
url |
http://eprints.utm.my/id/eprint/9572/1/SuhaizaMdSaadMFS2008.pdf |
_version_ |
1747814758039420928 |