TABLE OF CONTENTS
CHAPTER ONE: INTRODUCTION 1.0 Introduction | 1 | |
1.1 Background of Study | 1 | |
1.2 Statement of the Problem | 3 | |
1.3 Aim & objectives | 4 | |
1.4 Purpose of study | 4 | |
1.5 Significance of study | 5 | |
CHAPTER TWO: LITERATURE REVIEW | ||
2.0 Literature review | 6 | |
2.1 Introduction | 6 | |
2.2 Evolution of intrusion detection | 7 | |
2.3 Gaps in existing research literature | 16 | |
2.4 Classification of intrusion detection | 16 | |
2.4.1 Host-Based intrusion detection | 16 | |
2.4.2 Network-Based intrusion detection | 17 | |
2.5 Misuse and Anomaly based detection | 17 | |
Misuse based detection Advantages and limitations of misuse based detection Anomaly based intrusion detection | 18 | 17 18 |
2.5.2.1 Advantages and limitations of anomaly based detection | 18 |
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
- Introduction 20
- Overview of proposed system 20
- Design 22
- Architecture of the system 25
- Components of the system and its functional requirements 27
CHAPTER FOUR: SYSTEM IMPLEMENTATION AND TESTING
CHAPTER FIVE: CONCLUSION AND RECOMMENDATION
REFERENCE 36
APPENDIX
CHAPTER ONE
- INTRODUCTION
- Background of the Study
The rapid growth of internet in the recent past years, together with the enormous number of computers and other devices that link up to share resources; this open up the computer networks to be vulnerable of various devastating threats (Zhou and Zhao, 2013).
The diverse of types of attacks are – Probing, ping of death, OS fingerprinting, denial of service (DoS), user to root (U2R), remote to local (R2L) and others which affect the efficiency of network. The issue has made computer security experts to come up with improved and new techniques to explore and curtail such threats (Al-Saedi, Al-Khafaji, ALmomani and Ramadass, 2011). Some security measures like data encryption, firewall and authentication have been developed and used to serve as first line of defense. They only serve as perimeter fencing which are effective only in protecting and preventing unauthorized access to the systems/network but, not capable of monitoring within network traffic where majority of threats take place.
FRAMEWORK FOR ADAPTIVE INTRUSION DETECTION SYSTEM USING NAÏVE BAYES RECOGNITION