EconPapers    
Economics at your fingertips  
 

Network Monito ring System To Detect Unauthorized Connection

Isredza Rahmi A Hamid (), Nurul Hatun Ab Sukor (), Cik Feresa Mohd Foozy () and Zubaile Abdullah ()
Additional contact information
Isredza Rahmi A Hamid: Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia
Nurul Hatun Ab Sukor: Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia
Cik Feresa Mohd Foozy: Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia
Zubaile Abdullah: Information Security Interest Group, Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, 86400, Johor Malaysia

Acta Electronica Malaysia (AEM), 2017, vol. 1, issue 2, 13-16

Abstract: The Network Monitoring System to Detect Unauthorized Connection is a network analytic tool that use to review local area network usage. The main purpose of the application is monitoring the internet protocol traffic between local area network and Internet. In addition, this system aimed to detect unauthorized Internet Protocol addresses that are inside the network range. It also can prevent network intruders from Local Area Network connection (LAN). It is a computerized system that complete with element of confidentiality, integrity and availability. The system was built using waterfall methodology that begins with system analysis, design, implementation, testing, installation and maintenance. The system is using Visual Studio 2013 with SQL Server as server operations. There are ten modules in this system which are user main page, register admin module, register staff module, login admin module, login staff module, admin menu module, staff menu module, scan view module, status view module and report module. There are about 30 respondents who agreed and satisfied with the system. As a result, this system was successfully built to detect and block the unauthorized access in the network.

Keywords: Network Monitoring; Unauthorized; Local Area Network (LAN). (search for similar items in EconPapers)
Date: 2017-11-06
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.actaelectronicamalaysia.com/download/7325/ (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:zib:zbnaem:v:1:y:2017:i:2:p:13-16

DOI: 10.26480/aem.02.2017.13.16

Access Statistics for this article

Acta Electronica Malaysia (AEM) is currently edited by Dr. Shafishuhaza binti Sahlan

More articles in Acta Electronica Malaysia (AEM) from Zibeline International Publishing
Bibliographic data for series maintained by Zibeline International Publishing ( this e-mail address is bad, please contact ).

 
Page updated 2025-03-20
Handle: RePEc:zib:zbnaem:v:1:y:2017:i:2:p:13-16