Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
| dc.contributor.author | Chauhan, Karan | |
| dc.date.accessioned | 2025-05-01T16:10:19Z | |
| dc.date.available | 2025-05-01T16:10:19Z | |
| dc.date.issued | 2020 | |
| dc.description | The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out. Tools such as snort and Wireshark are used for this purpose. | |
| dc.identifier.doi | https://doi.org/10.7939/r3-jgvg-ax65 | |
| dc.language.iso | en | |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | |
| dc.subject | information security | |
| dc.subject | exploit | |
| dc.subject | SNORT | |
| dc.subject | Wireshark | |
| dc.subject | data | |
| dc.title | Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark | |
| dc.type | http://purl.org/coar/resource_type/c_1843 | |
| ual.jupiterAccess | http://terms.library.ualberta.ca/public |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Chauhan_2020_Fall_MISSM.pdf
- Size:
- 6.09 MB
- Format:
- Adobe Portable Document Format
