Full Project – Network intrusion detection system

Full Project – Network intrusion detection system

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

BACKGROUND STUDY

  • INTRODUCTION

Contemporary firms (financial/non-financial) depend largely on network operation for speed as well as services provided for the sole purpose of file sharing. The Nigerian National Petroleum Corporation (NNPC) uses network basically for communication between the headquarters and it different subsidiaries nation-wide, network will ease the communication speed and processes. Therefore, network is vital for services to be met. As the world has grown in technology rapidly, so is cyber-crime (intruders). Therefore, there exist need to develop tools against malicious attack. Network intrusion has been rapid as technology advances. Here, information is stolen, lost and destroyed or used against the owners wish although not all intrusions are active, some are passive, but still a crime. Many companies have inquired loss in the past few years and this is due to attacks in the network, weak firewall or outdated applications. The development of tools for detecting attackers or also preventing them is to be met, this software will detect different kinds of attack in the network such as Denial of Service (DoS) attack and similar kinds of attacks. This background study is telling us about the Network Intrusion Detection System (NIDS). which have long been a topic for theoretical research and development are gaining mainstream popularity as companies move more of theoretical business interactions to the Internet. An intrusion detection system can provide advance knowledge of attacks or intrusion attempts by detecting an intruder’s actions. In this respect, intrusion detection systems are a powerful tool in the organization’s fight to keep its computing resources secure. An intrusion detection system (IDS) is composed of hardware and software elements that work together to find unexpected events that may indicate an attack will happen, is happening, or has happened. Note that we must think in all three tenses; some products warn in advance that an attack may take place, some warn as they notice an attack in progress, and some warn when they notice the after-effects of the attack.

 

 

 

1.1       PROBLEM STATEMENT

The vulnerabilities in the company’s network and the attacks are majorly the problems faced and this is the result of weakness in the network or firewall of the firm. There are different types of attacks that can be performed on a weak network. Here, we would talk about as much attacks and we know.

  • Denial of Service Attacks (DDoS)

This attack is intended to make resources unavailable for users it was intended for. Attackers can deny service to individual victims just by entering a wrong password deliberately multiple times to deny access and make the victims account to be locked or they may overload the capabilities of the network or the service an d block all the users at once. While a network attack from a single IP address can be blocked by adding a new rule to the fire wall, many forms of Distributed Denial of Service (DDoS) attacks are possible, where the attack comes from a large number of point-and defending is much more difficult. Such attacks can originate from zombie computers of a botnet also known as robot network, but a range of other techniques are possible including reflection and amplification attacks, where innocent systems are fooled into sending traffic to the victim.

  • Ransomware

Ransomware attack was a major attack in the second half of the year 2017 where it took over some hospitals across England and Scotland and reports of similar attacks affecting organisations worldwide with more than fifty thousand computers been targeted, The ransomware virus affects the targeted system mostly via email attachment and encrypt or kidnap the files in the system and demands to for money which was $300 precisely in crypto currency to release your system and its documents, this is a form of cyber-kidnapping. This attack went global in countries as far as Spain, Italy, Russia, Vietnam, Taiwan, USA, England even here in Nigeria. This virus was known as WannaCry or WannaDecryptor.

 

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

 

Full Project – Network intrusion detection system