CHAPTER ONE
INTRODUCTION
An intrusion detection system (IDS)
monitors network traffic and monitors for suspicious activity and alert the
system or network administrator. In some cases the IDS may also respond to anomalous
or malicious traffic by taking action such blocking the user or source IP
address from accessing the network. IDS come in a variety of “flavors” and
approach the goal of detecting suspicious traffic in different ways. There are
network based (NIDS) and host based (HIDS) intrusion detection systems are
placed at a strategic point or points within the network to monitor traffic to
and from all devices on the network. HIDS host intrusion detection system on
the network. HIDS monitors the inbound and outbound pockets from the device
only and will alert the user. Intrusion detection, prevention and trace back
system are primarily focused on identifying possible incidents, logging
information about them, attempting to stop them and reporting them to security
administers. Intrusion prevention systems (IPS), also known as intrusion
detection and prevention systems (IDPS), are network or system activities for
malicious activity. Guide to intrusion detection and prevention systems
(IDPS). Computer security resource center, Scarf one [1].
1.1 Statement
of the Problem
The following problems were identified
in the existing system that necessitated the development of the intrusion
detection and prevention system:
- Absence
of an intrusion detection and prevention system.
- Insecurity
of customer information.
- Inability
to prevent intruders from gaining access to sensitive information stored
in the computer system.
- Low
level of file security.
1.2 Aim and
Objectives of Study
The aim of this project is to develop
an Intrusion Detection and Prevention System with the following objectives:
(1) To design a system
that will encrypt information pertaining to customers to prevent intrusion.
(2) To develop a system that
will require an encryption key before bank transaction information can be
viewed.
(3) To implement a system that will
prevent disclosure of customers’ data to fraudsters by utilizing cipher text.
- Significance
of the study
This study is significant in the
following ways:
- It
will help prevent unauthorized individuals (intruders) from gaining access
to the financial information of customers.
- It
will help in tightening the security level of the organization.
- The
study will reveal how encryption can be applied to prevent intruders from
gaining access to customer information.
- The
study will serve as a useful reference material to other researchers
seeking related information.
1.4 Scope of
the Study
This study covers Intrusion
Detection, and Prevention System using Gufax micro finance Bank Plc, Ikot
Ekpene as a case study. It is limited to the use of cipher text
encryption to prevent intruders from gaining access to vital information
of customers,
1.5 Organization of the Research
This research work is organized into
five chapters, chapter one is concerned with the introduction of the research
study and it presents the preliminaries, theoretical background, and statement
of the problem, aim and objectives of the study, significance of the study,
scope of the study, and organization of the research, Limitation of the study
and definition of terms.
Chapter two focuses on the literature
review; contribution of other scholars on the subject matter is discussed.
Chapter three contains the system
analysis and the design, it presents the research methodology used in
development of the system, it analyses the present system to identify the
problems and provide information on the merit of the proposed system. The
system design is also presented in this chapter.
Chapter four present the system
implementation, the choice of programming language used, and system requirement
for implementation
Chapter five, this chapter focuses on
the summary, conclusion and recommendation are also contained in this chapter
based on the study carried out.
- Definition
of Terms
Detection is the extraction of particular
information from a larger stream of information without specific cooperation
from or synchronization with the sender.
Intrusion: It is an illegal act of entering
possession of another’s property.
Password: A special code used by user to
gain access to the database or a research.
Security: safety, freedom danger.
Files: Is the collection of logically
related record.
Prevention: Maintenance performed to stop
fault occurring or developing into major detects.
Codes: To write a computer program by
putting one system of number, words symbols into another system.
System: a group of interdependent
items that interact regularly to perform task.
TOPIC: INTRUSION DETECTION AND PREVENTION SYSTEM
Chapters: 1 - 5
Delivery: Email
Delivery: Email
Number of Pages: 65
Price: 3000 NGN
In Stock

No comments:
Post a Comment
Add Comment