ABSTRACT
This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate intrusion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting intrusions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection episodes
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATE OF THE PROBLEM
1.3 PURPOSE OF THE STUDY
1.4 AIMS AND OBJECTIVES
1.5 SCOPE OF STUDY
1.6 LIMITATIONS OF STUDY
1.7 ASSUMPTIONS
1.8 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
3.1 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2 FACT FINDING METHOD USED
3.3 ORGANIZATION STRUCTURE
3.4 OBJECTIVES OF EXISTING SYSTEM
3.5 INPUT, PROCESS AND OUTPUT ANALYSIS
3.6 INFORMATION FLOW DIAGRAMS
3.7 PROBLEMS OF THE EXISTING SYSTEM
3.8 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM
4.2 INPUT SPECIFICATION AND DESIGN
4.3 OUTPUT SPECIFICATION AND DESIGN
4.4 FILE DESIGN
4.5 PROCEDURE CHART
4.6 SYSTEM FLOW CHART
4.7 SYSTEM REQUIREMENTS
CHAPTER FIVE
5.1 IMPLEMENTATION
5.2 PROGRAM DESIGN
5.3 PROGRAM FLOWCHART
5.4 PSEUDO CODE
5.5 SOURCE PROGRAM: TEST RUN
CHAPTER SIX
DOCUMENTATION
CHAPTER SEVEN
7.1 RECOMMENDATION
7.2 CONCLUSION
BIBLIOGRAPHY
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Design And Implementation Of Principles And Operation Of Sensor Based Intrusion Detection System (case Study Of Dhl Enugu).. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/2952/design-and-implementation-of-principles-and-operation-of-sensor-based-intrusion-detection-system-case-study-of-dhl-enugu-1104
"Design And Implementation Of Principles And Operation Of Sensor Based Intrusion Detection System (case Study Of Dhl Enugu)." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/2952/design-and-implementation-of-principles-and-operation-of-sensor-based-intrusion-detection-system-case-study-of-dhl-enugu-1104>.
"Design And Implementation Of Principles And Operation Of Sensor Based Intrusion Detection System (case Study Of Dhl Enugu).." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/2952/design-and-implementation-of-principles-and-operation-of-sensor-based-intrusion-detection-system-case-study-of-dhl-enugu-1104>.
"Design And Implementation Of Principles And Operation Of Sensor Based Intrusion Detection System (case Study Of Dhl Enugu).." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/2952/design-and-implementation-of-principles-and-operation-of-sensor-based-intrusion-detection-system-case-study-of-dhl-enugu-1104.
- Related Works
- Night Vision Technology
- Design And Implementation Of Measuring Xml Performance And Access Database (case Study Of Park Lane Hospital, Enugu)
- Design And Implementation Of A Computerized Homeopathic Management System (a Case Study Of University Of Nigeria Teaching Hospital Enugu State)
- A Computerized Bank Savings Account, Processing System
- Design And Implementation Of Computer Based. Resource Allocation System In A Dynamic /variable Resource Utilization Environment (case Study: Cyberafe)
- Design And Implementation Of A Computerised Quality Control System In Stock Product (a Case Study Of Anammco Nig. Ltd Emene Enugu)
- Design And Implementation Of Performance Evaluation Of Routing Algorithm Using Ns2 (case Study Of Mtn Nigeria)
- Design And Implementation Of An On-line Entrance Examination System. (a Case Study Of Enugu State Poset –primary Education Board )
- Design And Implementation Of A Computer Based Cartographic System (case Study Npc Enugu)
- Design And Implementation Of Computer Aided Charting And Graphic System For Statistical Presentation
