IMPLEMENTATION OF AN INTRUSION DETECTION SYSTEM ON MTU NETWORK

By: OLUSEYE-PAUL ISAACMaterial type: TextTextPublisher: Ibafo Computer Science and Mathematics 2022Edition: Dr. Akindele A. OnifadeDescription: x,; 61pSubject(s): Computer ScienceSummary: Cyber-attacks are growing more complex, posing greater challenges in detecting breaches effectively. Failure to prevent breaches could jeopardize security services' credibility, including data confidentiality, integrity, and availability, and academic institutions' reputations have not been left behind in this. To combat computer security threats, a variety of intrusion detection methods have been proposed in the literature. The interest of this work is to adopt an Intrusion Detection System (IDS) for academic institutions to provide early detection and prevent network intrusion. The idea is to provide an integrated system that will minimize the weaknesses of the different intrusion prevention techniques while putting to the most effective use the strength of each of them. It also talks about future research challenges to stop these kinds of attacks and make computer systems safer by showing how attackers try to avoid being caught. Malware, intrusion detection systems, and anomaly detection are some of the terms used in this paper.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current location Call number Status Date due Barcode Item holds
Main Library
Not for loan 18010301032
Total holds: 0

Cyber-attacks are growing more complex, posing greater challenges in detecting breaches effectively. Failure to prevent breaches could jeopardize security services' credibility, including data confidentiality, integrity, and availability, and academic institutions' reputations have not been left behind in this. To combat computer security threats, a variety of intrusion detection methods have been proposed in the literature. The interest of this work is to adopt an Intrusion Detection System (IDS) for academic
institutions to provide early detection and prevent network intrusion. The idea is to provide an integrated system that will minimize the weaknesses of the different intrusion prevention techniques while putting to the most effective use the strength of
each of them. It also talks about future research challenges to stop these kinds of attacks and make computer systems safer by showing how attackers try to avoid being caught.
Malware, intrusion detection systems, and anomaly detection are some of the terms used in this paper.

There are no comments on this title.

to post a comment.

Powered by Koha