ABSTRACT
An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.
IDPSes typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDPSes can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack’s content.
TABLE OF CONTENTS
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF STUDY
1.4DEFINITION OF TERMS
1.5ASSUMPTION OF STUDY
CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 INTRUSION PREVENTION SYSTEM
2.2 IS IDS THE SAME AS FIREWALL?
2.3 TYPES OF INTRUSION DETECTION SYSTEM
CHAPTER THREE
3.0 NETWORK-BASED VS. HOST-BASED IPS
3.1 IDS VS. IPS
CHAPTER FOUR
4.0 DEVELOPMENT OF AN INTRUSION DETECTION SYSTEM
4.1 STATISTICAL ANOMALY AND SIGNATURE BASED IDSES
4.1.1 STATISTICAL ANOMALY-BASED IDS
4.1.2 SIGNATURE-BASED IDS
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Intrusion Detection And Prevention System.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/278/intrusion-detection-and-prevention-system
"Intrusion Detection And Prevention System." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/278/intrusion-detection-and-prevention-system>.
"Intrusion Detection And Prevention System.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/278/intrusion-detection-and-prevention-system>.
"Intrusion Detection And Prevention System.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/278/intrusion-detection-and-prevention-system.
- Related Works
- Design And Implementation Of Web User Authentication (case Study Of Unn Nsukka)
- Design An Implementation Of A Computer Based Seaport Billing System (a Case Study Of Nigerian Port Authority Lagos)
- Design And Implementation Of An Online Voting System (a Case Study Of Ensieec Enugu)
- Utilities To Compress, Decompress And Split Merge Files
- Design And Implementation Of Parallel Processing Implementation Of The Mandelbrot Set On Gpu For Online Payment (case Study Of Imt Enugu)
- Data Recovery
- Design And Implementation Of A Computerized Hotel Business Billing System. (a Case Study Of Modotel Hotel Limited Enugu)
- Design And Implementation Of Computerized Livestock Management Information System
- Design And Implementation Of A Computerised Market Information System (a Case Study Of 9th Mile Corner Ngwo)
- Design And Implementation Of Club Side Management Information Technology System (case Study Of Enugu Rangers Management Board)