• Vu Xuan Thang Hung Yen University of Technology and Education
  • Tran Do Thu Ha Hung Yen University of Technology and Education
  • Dang Van Anh Hung Yen University of Technology and Education
Keywords: Network monitoring, IDS protected, IDS Snort


This report presents a process for studying some of the vulnerabilities in the Department of Health network. From the results of the research team report, the team proposed solutions to deploy network monitoring system to ensure network security


Nguyễn Thu Trang, Hệ thống thông tin y tế và tình hình ứng dụng tại Việt Nam, Luận văn thạc sĩ, 2008, tr. 46-61.

Richard Bejtlich, The Practice of Network Security Monitoring. William Pollock, ISBN: 1-59327-509-9, 2013, pp. 342-357.

Phạm Đức Nhơn, Xây dựng hệ thống giám sát tập trung trên cơ sở SNMP, Luận văn thạc sĩ kỹ thuật, Học viện CN BCVT, 2013. tr. 23-28.

Chris Fry and Martin Nystrom, Security monitoring. O’Reilly Media, ISBN: 978-0-596-51816-5, 2009, pp. 61-83.

Nguyễn Mạnh Hùng, Phát hiện và phòng chống xâm nhập trái phép mạng máy tính, Luận văn thạc sĩ, 2013, tr. 40-46.

Vikas Mishra , V.K. Vijay, S. Tazi, Intrusion Detection System with Snort in Cloud Computing: Advanced IDS. Proceedings of International Conference on ICT for Sustainable Development, Vol 408 of the series Advances in Intelligent Systems and Computing, 2016, pp.457-465.

Joao Afonso, Pedro Veiga, Enhancing DNS security using dynamic firewalling with network agents. Computer Science and Information Systems (FedCSIS) 2011 Federated Conference on, pp. 777-782.

P. Tzerefos, C. Smythe, I. Stergiou, and S. Cvetkovic, A Comparative Study of Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP) and X.400 Electronic Mail Protocols. Proceedings of the IEEE 1997 22nd Conference on Local Computer Networks - LCN, pp. 545-554, 199.

Slagell A., Yurcik W., Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization. IEEE 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005, pp. 80-89.

Ya-Ting Fan Shiuh-Jeng Wang, Intrusion Investigations with Data-Hiding for Computer LogFile Forensics. Proceedings of the IEEE 5th International Conference on Future Information Technology, May 2010, pp. 1-6.

Jie wang, Xianqiang chen, Application of web usage mining in the struction of distance opening education web site, 2008, vol. 4, pp. 157-160.

Y. Y. Yao, H. J. Hamilton, Xuewei Wang, PagePrompter, An Intelligent Web Agent Created Using Data Mining Techniques. Rough Sets and Current Trends in Computing, 2002, vol. 2475, pp. 949-.

Ouyang Yang, Zhu Miaoliang, Effective E-Learning Environment Personalization using Web Usage Mining Technology. In Innovations in E-learning Instruction Technology Assessment and Engineering Education, Springer Netherlands:, 2007, pp. 311-315.

How to Cite
Vu Xuan Thang, Tran Do Thu Ha, & Dang Van Anh. (2018). RESEARCH AND DEVELOPMENT OF THE NETWORK MONITORING SYSTEM FOR THE MINISTRY OF HEALTH. UTEHY Journal of Science and Technology, 18, 57-63. Retrieved from