INTRUSION DETECTION AND PREVENTION SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0492
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 2K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

CHAPTER ONE

INTRODUCTION

  • Introduction

An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such blocking the user or source IP address from accessing the network. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems are placed at a strategic point or points within the network to monitor traffic to and from all devices on the network. HIDS host intrusion detection system on the network. HIDS monitors the inbound and outbound pockets from the device only and will alert the user. Intrusion detection, prevention and trace back system are primarily focused on identifying possible incidents, logging information about them, attempting to stop them and reporting them to security administers. Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network or system activities for malicious activity.  Guide to intrusion detection and prevention systems (IDPS). Computer security resource center, Scarf one [1].

1.1     Statement of the Problem

The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:

  1. Absence of an intrusion  detection and prevention system.
  2. Insecurity of customer information.
  3. Inability to prevent intruders from gaining access to sensitive information stored in the computer system.
  4. Low level of file security.

1.2     Aim and Objectives of Study

The aim of this project is to develop an Intrusion Detection and Prevention System with the following objectives:

(1)   To design a system that will encrypt information pertaining to customers to prevent intrusion.

(2)  To develop a system that will require an encryption key before bank transaction information can be viewed.

(3) To implement a system that will prevent disclosure of customers’ data to fraudsters by utilizing cipher text.

  • Significance of the study

This study is significant in the following ways:

  1. It will help prevent unauthorized individuals (intruders) from gaining access to the financial information of customers.
  2. It will help in tightening the security level of the organization.
  3. The study will reveal how encryption can be applied to prevent intruders from gaining access to customer information.
  4. The study will serve as a useful reference material to other researchers seeking related information.

1.4     Scope of the Study

This study covers Intrusion Detection, and Prevention System using Gufax micro finance Bank Plc, Ikot Ekpene as a case study. It is limited to the use of cipher text encryption  to prevent intruders from gaining access to vital information of customers,

1.5 Organization of the Research

This research work is organized into five chapters, chapter one is concerned with the introduction of the research study and it presents the preliminaries, theoretical background, and statement of the problem, aim and objectives of the study, significance of the study, scope of the study, and organization of the research, Limitation of the study and definition of terms.

Chapter two focuses on the literature review; contribution of other scholars on the subject matter is discussed.

Chapter three contains the system analysis and the design, it presents the research methodology used in development of the system, it analyses the present system to identify the problems and provide information on the merit of the proposed system. The system design is also presented in this chapter.

Chapter four present the system implementation, the choice of programming language used, and system requirement for implementation

Chapter five, this chapter focuses on the summary, conclusion and recommendation are also contained in this chapter based on the study carried out.

  • Definition of Terms

Detection is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.

Intrusion: It is an illegal act of entering possession of another’s property.

Password: A special code used by user to gain access to the database or a research.

Security: safety, freedom danger.

Files: Is the collection of logically related record.

Prevention: Maintenance performed to stop fault occurring or developing into major detects.

Codes: To write a computer program by putting one system of number, words symbols into another system.

System:   a group of interdependent items that interact regularly to perform task.

INTRUSION DETECTION AND PREVENTION SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0492
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 2K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0492
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 65 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT The goal of a network-based IDS is to identify malicious behavior that targets a network and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network is known as graphical modeling tool used to model decision... Continue Reading
    ABSTRACT Cloud Computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing systems can be easily threatened by various cyber-attacks, because most of Cloud Computing systems provide services to so many people who are not proven to be trustworthy.Therefore, a Cloud Computing system needs to... Continue Reading
    ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By... Continue Reading
    ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    Call Us
    whatsappWhatsApp Us