Project Materials

COMPUTER ENGINEERING PROJRCT TOPICS

INTRUTION DETECTION PREVENTION AND TRACE BACK SYSTEM

INTRUTION DETECTION PREVENTION AND TRACE BACK SYSTEM

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

INTRUTION DETECTION PREVENTION AND TRACE BACK SYSTEM

ABSTRACT
No open computer network is immune to invasions, as demonstrated by recent denial-of-service attacks on some prominent Internet sites.

Because of its open medium, dynamic shifting topology, cooperative algorithms, absence of centralised monitoring and management point, and lack of a clear line of defence, wireless ad-hoc networks are particularly vulnerable.

Many intrusion detection techniques built for fixed wired networks are no longer applicable in this new environment. A difficult research problem is determining how to do it differently and more effectively.

In this paper, we will first look at the weaknesses of a wireless ad-hoc network, why we require intrusion detection, and why present approaches cannot be used directly.

The new intrusion detection and response mechanisms that we are creating for wireless ad-hoc networks are then described.

1.0 INTRODUCTION
An intrusion detection system (IDS) is intended to monitor all inbound and outbound network traffic and identify any abnormal patterns that may signal a network or system attack by someone attempting to break into or compromise a system.

IDS is classified as a passive-monitoring system since its primary goal is to alert you to suspicious behaviour rather than to prevent it. An IDS examines your network traffic and data to detect probes, assaults, exploits, and other vulnerabilities.

IDSs can react to a suspicious event in a variety of methods, such as flashing a warning, logging the event, or even paging an administrator. In rare situations, the IDS may be requested to alter the network in order to mitigate the effects of the suspected intrusion.

An intrusion detection system (IDS) primarily looks for strange activity and events that could be the product of a virus, worm, or hacker.

This is accomplished by searching for known intrusion signatures or attack signatures that characterise various worms or viruses, as well as tracking general deviations that deviate from normal system activity. Only known attacks can be detected and reported by the IDS.

1.1 STATEMENT OF THE PROBLEM

The amount of pin code numbers accessible in the country today is insufficient to accommodate the growing population, and many of the available lines are faulty due to a lack of maintenance. Our government does not provide adequate funding for MTN management.

MTN complains about limited line capacity on a daily basis, however despite this, some people are assigned more than one line.

The network of MTN cabinets is no longer useful, and the under-ground cable infrastructure no longer serves the existing population of the community.

MTN is having difficulty maintaining the identification and record of its subscribers, making it hard for them to know who lines are assigned to and who pin code numbers are not assigned to.

1.2 PURPOSE OF THE STUDY

The primary goal of this research is to computerise the XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks system in order to boost their service transaction rate to their varied clients.

1.3 AIMS AND OBJECTIVES

The purpose of this invention is to create a method and system for creating a number stream that employs the most advanced cryptanalytic and statistical approaches now available.

To develop a method and system for producing a non-deterministic asynchronous pin code number?
The purpose of the present invention is to provide a method and system for ensuring that no specific subsequence of an asynchronous pin code number or derivative value is used twice while also removing vulnerabilities associated with retaining records of values created.

To propose a method and system for producing an asynchronous pin code number that is resistant to compromise and assault.

To develop a technique and system for producing an asynchronous pin code number that takes use of the ostensibly automatic nature of ordered systems in general?

The use of XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks has sped up the process of allocating numbers to both individuals. It has assisted numerous organisations in alleviating the significant load involved with the manual process of assigning numbers to its clients. It has aided in the generation, processing, and storage of accurate and dependable numbers.

1.4 SCOPE/DELIMITATIONS

The research is for Ad-Hoc Networks and is being conducted in collaboration with MTN Nigeria. It critically examines the current system in use, analysing the problem, and developing a modified system that will solve the current and future problems that may arise with little or no modification. This will be quite beneficial.

1.5 LIMITATIONS/CONSTRAINTS

During the duration of the project, our main physical difficulty was a lack of time and money. With my academics and tests on the horizon, I only have a limited amount of time to conduct this research thoroughly. However, I conducted extensive study.

1.6 DEFINITION OF TERMS

Asynchronous refers to or employs an electronic communication technology that transfers data in just one direction, one character at a time.

A COMPUTER is an electronic device that accepts data, informs of input, processes the data, stores the data, and can retrieve stored data.

HARDWARE is a computer’s physical components.

SYSTEM is a collection of all computer components, including humans.

STAFF is a person who works for a company.

STORAGE is a data/information storage medium.

DATABASE is a grouping of related files.

A telephone is a device that transmits and receives voice messages and data.

A telephone call is a communication conducted over the phone.

A telephone booth is an enclosed or partially enclosed enclosure with a pay phone.

Telephone number the series of numbers that identify a certain telephone and must be dialled in order for a caller to be connected to it

Hardware is the electromechanical component of a computer system.
Data that has been processed, evaluated, and comprehended by the recipient of the message or report is referred to as information.

The Internet is a collection of computer networks that follow common protocols and allow computers and the programmes they execute to connect directly.

Server: A procedure that delivers requested services to clients.

Software is a logically created programme that is used by hardware to conduct its operations.

A system is a collection of hardware, software, data, procedures, and people.
A website is a space or location that has been customised by a firm, organisation, or individual that is accessible via an internet address.

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisements