Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
碩士 === 國防大學 === 資訊管理學系 === 105 === Wide range of applications have been developed as internet becomes popular. Hackers have various ways to attack the system, such as invasion at interconnection equipment, and use them to stop the service. It's so call Distributed Denial of Service. System cann...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/5a58ru |
id |
ndltd-TW-105NDU00654020 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NDU006540202019-05-15T23:10:10Z http://ndltd.ncl.edu.tw/handle/5a58ru Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi 物聯網之資訊安全偵測機制研究-以Snort建置於Raspberry Pi為例 Chang, Hua-Hsien 張華顯 碩士 國防大學 資訊管理學系 105 Wide range of applications have been developed as internet becomes popular. Hackers have various ways to attack the system, such as invasion at interconnection equipment, and use them to stop the service. It's so call Distributed Denial of Service. System cannot achieve perfect security protection with encryption and authentication mechanism which is provided by the defense mechanism itself since there are wide range of attacks from outside. This research constructs a set of portable intrusion detection systems, which is based on Snort and Raspberry Pi. It warns the system of suspicious intrusion or abnormal wiring behavior. That security mechanism increases the material security equipment. Su, Pin-Chang Tasi, Chien-Hua 蘇品長 蔡建華 2016 學位論文 ; thesis 60 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學 === 資訊管理學系 === 105 === Wide range of applications have been developed as internet becomes popular. Hackers have various ways to attack the system, such as invasion at interconnection equipment, and use them to stop the service. It's so call Distributed Denial of Service. System cannot achieve perfect security protection with encryption and authentication mechanism which is provided by the defense mechanism itself since there are wide range of attacks from outside. This research constructs a set of portable intrusion detection systems, which is based on Snort and Raspberry Pi. It warns the system of suspicious intrusion or abnormal wiring behavior. That security mechanism increases the material security equipment.
|
author2 |
Su, Pin-Chang |
author_facet |
Su, Pin-Chang Chang, Hua-Hsien 張華顯 |
author |
Chang, Hua-Hsien 張華顯 |
spellingShingle |
Chang, Hua-Hsien 張華顯 Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi |
author_sort |
Chang, Hua-Hsien |
title |
Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi |
title_short |
Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi |
title_full |
Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi |
title_fullStr |
Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi |
title_full_unstemmed |
Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi |
title_sort |
security detection mechanisms for the internet of things - a case study of snort build on raspberry pi |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/5a58ru |
work_keys_str_mv |
AT changhuahsien securitydetectionmechanismsfortheinternetofthingsacasestudyofsnortbuildonraspberrypi AT zhānghuáxiǎn securitydetectionmechanismsfortheinternetofthingsacasestudyofsnortbuildonraspberrypi AT changhuahsien wùliánwǎngzhīzīxùnānquánzhēncèjīzhìyánjiūyǐsnortjiànzhìyúraspberrypiwèilì AT zhānghuáxiǎn wùliánwǎngzhīzīxùnānquánzhēncèjīzhìyánjiūyǐsnortjiànzhìyúraspberrypiwèilì |
_version_ |
1719142760906227712 |