Please use this identifier to cite or link to this item:
http://dspace.cityu.edu.hk/handle/2031/413
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Anthony Yat Wan | |
dc.date.accessioned | 2006-01-20T01:56:54Z | |
dc.date.accessioned | 2017-09-19T08:50:44Z | |
dc.date.accessioned | 2019-02-12T06:52:57Z | - |
dc.date.available | 2006-01-20T01:56:54Z | |
dc.date.available | 2017-09-19T08:50:44Z | |
dc.date.available | 2019-02-12T06:52:57Z | - |
dc.date.issued | 2005 | |
dc.identifier.other | 2005cslyw441 | |
dc.identifier.uri | http://144.214.8.231/handle/2031/413 | - |
dc.description.abstract | When it comes to network security, firewalls must be mentioned. However, firewalls was failed to block attacks from application layers as it permitted vulnerable protocols such as HTTP and FTP to pass. New technologies such as intrusion detection systems (IDS) and intrusion prevention systems (IPS) have brought us a new problem of accuracy. While the former generated tons of confusing alerts with false-positives mixed together and no trace of false-negatives, the latter even blocked innocent traffic and costs losses in services outage. In the other hand, attacks have becoming more sophisticated: hackers were targeting applications. And the new explosion of zero-day attacks, which occurred at the day of announcement of the corresponding vulnerability, urged security professionals to redefine the conventional mechanisms in information security. With those reasons, network forensics analysis has been applied since the time of computer network was born. It aimed to collect evidence for counts after an incident. And it has been evolved even further to gather evidence before, during and after an incident. This project focused on the current technologies in network security and network forensics, to design an innovative system model with an idea of ‘Black Box’ for both areas called ‘BALL: the Network Black Box’. With concern on the practical issues such as growing network speed and limited storage space, ‘Packet Dispatching’ which was evolved from traditional packet filtering, was proposed to solve the problem by dispatching a packet into different storage queues with different limits according to different sets of filters, together formed different capture rules. Finally, two versions of the model – ballCLI and ballGUI – were implemented and tested for verifications. | en |
dc.format.extent | 164 bytes | |
dc.format.mimetype | text/html | |
dc.rights | This work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner. | |
dc.rights | Access is restricted to CityU users. | |
dc.title | BALL: designing and implementing network black box | en |
dc.contributor.department | Department of Computer Science | en |
dc.description.supervisor | Prof. Jia Xiaohua. First Reader: Dr. Wan Pengjun. Second Reader: Miss Mong Florence | en |
Appears in Collections: | Computer Science - Undergraduate Final Year Projects |
Files in This Item:
File | Size | Format | |
---|---|---|---|
fulltext.html | 164 B | HTML | View/Open |
Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.