Show simple item record

dc.contributor.authorTushar, Ahadul Islam
dc.contributor.authorChoudhury, Urbi Roy
dc.contributor.authorBoby, Sadeka Afrin
dc.contributor.authorRajon, Md. Rasheduzzaman
dc.date.accessioned2019-02-24T07:49:37Z
dc.date.available2019-02-24T07:49:37Z
dc.date.issued2019-02-05
dc.identifier.urihttp://dspace.uiu.ac.bd/handle/52243/841
dc.description.abstractAs we know, the amount of connecting devices is increasing very fast. The rapid growth of computer network system brings many benefits of an organization. As well as there are many networking security issues also. We need strong security system like firewall technology, antivirus technology, valid authentication system to protect our vulnerable networks. But it may not possible to eliminate all vulnerabilities of networks. Because secured networks can also be hacked, we need such as machines for our vulnerable networks which can monitor, detect and analyze malicious activities. In this project, we have implemented a security system, which can monitor, detect and analyze malicious activities of our network. Here we have used Security Onion as a security monitoring machine. It can detect malicious activities and we can analyze those activities by using its pre-installed tools.en_US
dc.titleNetwork Monitoring, Detection & Analysisen_US
dc.typeProject Reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record