FRAMEWORK FOR ADAPTIVE INTRUSION DETECTION SYSTEM USING NAÏVE BAYES RECOGNITION

0
576

TABLE OF CONTENTS

CHAPTER ONE: INTRODUCTION   1.0 Introduction     1
1.1 Background of Study 1
1.2 Statement of the Problem 3
1.3 Aim & objectives 4
1.4 Purpose of study 4
1.5 Significance of study 5
  CHAPTER TWO: LITERATURE REVIEW  
2.0 Literature review 6
2.1 Introduction 6
2.2 Evolution of intrusion detection 7
2.3 Gaps in existing research literature 16
2.4 Classification of intrusion detection 16
2.4.1 Host-Based intrusion detection 16
2.4.2 Network-Based intrusion detection 17
2.5 Misuse and Anomaly based detection 17
Misuse based detection   Advantages and limitations of misuse based detection   Anomaly based intrusion detection    1817       18
2.5.2.1 Advantages and limitations of anomaly based detection 18

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

CHAPTER FOUR: SYSTEM IMPLEMENTATION AND TESTING

CHAPTER FIVE: CONCLUSION AND RECOMMENDATION

REFERENCE                                                                                                                         36

APPENDIX

CHAPTER ONE

  1. INTRODUCTION
  1. Background of the Study

The rapid growth of internet in the recent past years, together with the enormous number of computers and other devices that link up to share resources; this open up the computer networks to be vulnerable of various devastating threats (Zhou and Zhao, 2013).

The diverse of types of attacks are – Probing, ping of death, OS fingerprinting, denial of service (DoS), user to root (U2R), remote to local (R2L) and others which affect the efficiency of network. The issue has made computer security experts to come up with improved and new techniques to explore and curtail such threats (Al-Saedi, Al-Khafaji, ALmomani and Ramadass, 2011). Some security measures like data encryption, firewall and authentication have been developed and used to serve as first line of defense. They only serve as perimeter fencing which are effective only in protecting and preventing unauthorized access to the systems/network but, not capable of monitoring within network traffic where majority of threats take place.

FRAMEWORK FOR ADAPTIVE INTRUSION DETECTION SYSTEM USING NAÏVE BAYES RECOGNITION