Author
Listed:
- Isredza Rahmi A Hamid
(Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia)
- Nurul Hatun Ab Sukor
(Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia)
- Cik Feresa Mohd Foozy
(Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia)
- Zubaile Abdullah
(Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia)
Abstract
The Network Monitoring System to Detect Unauthorized Connection is a network analytic tool that use to review local area network usage. The main purpose of the application is monitoring the internet protocol traffic between local area network and Internet. In addition, this system aimed to detect unauthorized Internet Protocol addresses that are inside the network range. It also can prevent network intruders from Local Area Network connection (LAN). It is a computerized system that complete with element of confidentiality, integrity and availability. The system was built using waterfall methodology that begins with system analysis, design, implementation, testing, installation and maintenance. The system is using Visual Studio 2013 with SQL Server as server operations. There are ten modules in this system which are user main page, register admin module, register staff module, login admin module, login staff module, admin menu module, staff menu module, scan view module, status view module and report module. There are about 30 respondents who agreed and satisfied with the system. As a result, this system was successfully built to detect and block the unauthorized access in the network.
Suggested Citation
Isredza Rahmi A Hamid & Nurul Hatun Ab Sukor & Cik Feresa Mohd Foozy & Zubaile Abdullah, 2017.
"Network Monito ring System To Detect Unauthorized Connection,"
Acta Electronica Malaysia (AEM), Zibeline International Publishing, vol. 1(2), pages 13-16, January.
Handle:
RePEc:zib:zbnaem:v:1:y:2017:i:2:p:13-16
DOI: 10.26480/aem.02.2017.13.16
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:zib:zbnaem:v:1:y:2017:i:2:p:13-16. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Zibeline International Publishing (email available below). General contact details of provider: https://www.actaelectronicamalaysia.com/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.