DC Field | Value | Language |
dc.contributor.author | ATTATFA, ABdelghani | - |
dc.contributor.author | CHELOUF, SOufyane | - |
dc.date.accessioned | 2022-04-14T13:43:24Z | - |
dc.date.available | 2022-04-14T13:43:24Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/218 | - |
dc.description | M Kechar Mohamed Encadreur | en_US |
dc.description.abstract | With the rise of the internet in recent years, the number of users has greatly increased.
The Internet serves countless personal and professional needs for individuals
and societies. However, this interconnection of computers also allows malicious users
to use these resources for malicious purposes, exposing current computer networks
to an increasing number of security threats, with new types of attacks appearing
continuously and increasing in number, severity and impact. One of the most important
attacks is the zero-day attack, which occurs on the same day that a weakness
is detected in a software. This weak point is exploited before a patch by the creator
of the software, so their signature is unknown in this moment by security software
manufacturers.
For These reasons, network administrators are looking for effective security
solutions that can protect the company’s network. In this context, the IDS(Intrusion
Detection System) is a good solution for the protection of computer networks. | en_US |
dc.language.iso | en | en_US |
dc.title | Design and implementation of an intrusion detection system | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Ingénieur
|