Development of an Intrusion Detection System in a Computer Network.
dc.contributor.author | Babatunde, R. S., Adewole K. S., Abdulsalam S. O. and Isiaka R. M. (2014) | |
dc.date.accessioned | 2024-10-22T09:44:44Z | |
dc.date.available | 2024-10-22T09:44:44Z | |
dc.date.issued | 2014-03-14 | |
dc.description.abstract | The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic. | |
dc.identifier.citation | Babatunde, R. S., Adewole K. S., Abdulsalam S. O. and Isiaka R. M. (2014) | |
dc.identifier.issn | 3479-3487. https://rajpub.com/index.php/ijct/article/view/2918 | |
dc.identifier.uri | https://kwasuspace.kwasu.edu.ng/handle/123456789/2498 | |
dc.language.iso | en | |
dc.publisher | International Journal of Computers & Technology. | |
dc.title | Development of an Intrusion Detection System in a Computer Network. | |
dc.type | Article |