TABLE OF CONTENTS
CHAPTER ONE: INTRODUCTION 1.0 Introduction 11.1 Background of Study 11.2 Statement of the Problem 31.3 Aim & objectives 41.4 Purpose of study 41.5 Significance of study 5 CHAPTER TWO: LITERATURE REVIEW 2.0 Literature review 62.1 Introduction 62.2 Evolution of intrusion detection 72.3 Gaps in existing research literature 162.4 Classification of intrusion detection 162.4.1 Host-Based intrusion detection 162.4.2 Network-Based intrusion detection 172.5 Misuse and Anomaly based detection 17Misuse based detection Advantages and limitations of misuse based detection Anomaly based intrusion detection 1817 22.214.171.124 Advantages and limitations of anomaly based detection 18CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
CHAPTER FOUR: SYSTEM IMPLEMENTATION AND TESTING
CHAPTER FIVE: CONCLUSION AND RECOMMENDATION
CHAPTER ONEINTRODUCTIONBackground of the Study
The rapid growth of internet in the recent past years, together with the enormous number of computers and other devices that link up to share resources; this open up the computer networks to be vulnerable of various devastating threats (Zhou and Zhao, 2013).
The diverse of types of attacks are – Probing, ping of death, OS fingerprinting, denial of service (DoS), user to root (U2R), remote to local (R2L) and others which affect the efficiency of network. The issue has made computer security experts to come up with improved and new techniques to explore and curtail such threats (Al-Saedi, Al-Khafaji, ALmomani and Ramadass, 2011). Some security measures like data encryption, firewall and authentication have been developed and used to serve as first line of defense. They only serve as perimeter fencing which are effective only in protecting and preventing unauthorized access to the systems/network but, not capable of monitoring within network traffic where majority of threats take place.
FRAMEWORK FOR ADAPTIVE INTRUSION DETECTION SYSTEM USING NAÏVE BAYES RECOGNITION
- 1.Your Full name
- 2. Your Active Email Address
- 3. Your Phone Number
- 4. Amount Paid
- 5. Project Topic
- 6. Location you made payment from