Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi

碩士 === 國防大學 === 資訊管理學系 === 105 === Wide range of applications have been developed as internet becomes popular. Hackers have various ways to attack the system, such as invasion at interconnection equipment, and use them to stop the service. It's so call Distributed Denial of Service. System cann...

Full description

Bibliographic Details
Main Authors: Chang, Hua-Hsien, 張華顯
Other Authors: Su, Pin-Chang
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/5a58ru
id ndltd-TW-105NDU00654020
record_format oai_dc
spelling ndltd-TW-105NDU006540202019-05-15T23:10:10Z http://ndltd.ncl.edu.tw/handle/5a58ru Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi 物聯網之資訊安全偵測機制研究-以Snort建置於Raspberry Pi為例 Chang, Hua-Hsien 張華顯 碩士 國防大學 資訊管理學系 105 Wide range of applications have been developed as internet becomes popular. Hackers have various ways to attack the system, such as invasion at interconnection equipment, and use them to stop the service. It's so call Distributed Denial of Service. System cannot achieve perfect security protection with encryption and authentication mechanism which is provided by the defense mechanism itself since there are wide range of attacks from outside. This research constructs a set of portable intrusion detection systems, which is based on Snort and Raspberry Pi. It warns the system of suspicious intrusion or abnormal wiring behavior. That security mechanism increases the material security equipment. Su, Pin-Chang Tasi, Chien-Hua 蘇品長 蔡建華 2016 學位論文 ; thesis 60 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學 === 資訊管理學系 === 105 === Wide range of applications have been developed as internet becomes popular. Hackers have various ways to attack the system, such as invasion at interconnection equipment, and use them to stop the service. It's so call Distributed Denial of Service. System cannot achieve perfect security protection with encryption and authentication mechanism which is provided by the defense mechanism itself since there are wide range of attacks from outside. This research constructs a set of portable intrusion detection systems, which is based on Snort and Raspberry Pi. It warns the system of suspicious intrusion or abnormal wiring behavior. That security mechanism increases the material security equipment.
author2 Su, Pin-Chang
author_facet Su, Pin-Chang
Chang, Hua-Hsien
張華顯
author Chang, Hua-Hsien
張華顯
spellingShingle Chang, Hua-Hsien
張華顯
Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
author_sort Chang, Hua-Hsien
title Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
title_short Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
title_full Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
title_fullStr Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
title_full_unstemmed Security Detection Mechanisms for the Internet of Things - A Case Study of Snort Build on Raspberry Pi
title_sort security detection mechanisms for the internet of things - a case study of snort build on raspberry pi
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/5a58ru
work_keys_str_mv AT changhuahsien securitydetectionmechanismsfortheinternetofthingsacasestudyofsnortbuildonraspberrypi
AT zhānghuáxiǎn securitydetectionmechanismsfortheinternetofthingsacasestudyofsnortbuildonraspberrypi
AT changhuahsien wùliánwǎngzhīzīxùnānquánzhēncèjīzhìyánjiūyǐsnortjiànzhìyúraspberrypiwèilì
AT zhānghuáxiǎn wùliánwǎngzhīzīxùnānquánzhēncèjīzhìyánjiūyǐsnortjiànzhìyúraspberrypiwèilì
_version_ 1719142760906227712