dc.contributor.author |
Hassaan, Syed Muhammad |
|
dc.contributor.author |
Dar, Ali Ahmed |
|
dc.contributor.author |
Ali Shah, Syed Hamza |
|
dc.contributor.author |
Ahmed, Sharjeel |
|
dc.contributor.author |
Supervised by Asst Prof Bilal Rauf |
|
dc.contributor.author |
Supervised by Dr. Faisal Amjad |
|
dc.date.accessioned |
2025-02-10T05:14:33Z |
|
dc.date.available |
2025-02-10T05:14:33Z |
|
dc.date.issued |
2022-05 |
|
dc.identifier.other |
PCS431 |
|
dc.identifier.uri |
http://10.250.8.41:8080/xmlui/handle/123456789/49571 |
|
dc.description.abstract |
In this age of internet due to the advancement in technology a lot of data is being used and transferred from computer to computer through internet so it has become very important to monitor such huge amount of data because unmonitored data can cause a lot of threats. There are a lot of malwares viruses which can harm computer in one way or the other. To tackle this problem, we proposed a solution that will monitor the data traffic that is coming to the network and inside the network. This solution will fetch the data logs and organize them in a readable format in real time environment and if it contains any harmful aspects based on the defined rules for threats, it will notify the admin the admin and alert will be generated about the possible threats. The admin will be notified about the threats he can see and check if he finds the traffic harmful, he can discard it from the network if he finds it okay he can let it pass through the network. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
MCS |
en_US |
dc.title |
SEED (Security Event Enumeration & Detection) |
en_US |
dc.type |
Project Report |
en_US |