An Intrusion Detection System Using a Signature Based Approach (Record no. 6066)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01844nam a22001457a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210804b ||||| |||| 00| 0 eng d |
100 ## - MAIN ENTRY--AUTHOR | |
Author | ALAWADA, Olajumoke Tosin |
245 ## - TITLE STATEMENT | |
Title | An Intrusion Detection System Using a Signature Based Approach |
250 ## - SUPERVISOR | |
Supervisor | Dr. KASALI, F. A. |
260 ## - IMPRINT | |
Place of publication | Ibafo |
Department (College) | Computer Science |
Date of publication | 2019 |
300 ## - COLLATION | |
Pagination | ix,; 66p. |
Other physical details | dia, tables |
520 ## - SUMMARY, ETC. | |
Summary, etc | Many organizations and institutions have imposed many techniques to stop unwanted users from getting access to confidential information, some of which lack strong security methods and has cause many problems of unauthorized access. The rate at which hackers have easy access to different organizations, websites and the internet has recently increased. Due to network traffic, packets which are received can contain virus created by hackers which can corrupt the entire network infrastructure. The aim of this research creates an instruction Detection System (IDS) for an improved network security that can monitor network traffic.<br/>The method which was used involves a signature based system, open source software snort which will monitor the network traffic and will analyze the incoming packets in the network. The IDS improves network security which is effective and easy to manage the IDS system all over the network security. The research looks to help other researchers and users to understand the concept of snort based IDS.<br/>The result of the project showed how Snort detects unknown attacks and complies the data of 59142 packets received, 59137 (99.992%) packets analyzed, 5 (0.008%) outstanding packets,10214 (17.157%) alerts, 25720 (43.489%) allowed packets.<br/>In this project, it was concluded that a Signature based Intrusion Detection System approach was to overcome the shortcomings of previous IDS. |
650 ## - TRACINGS | |
Main Subject | Computer Science |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Item type | Students Thesis |
No items available.