Full Project – A web-based intrusion detection and prevention system using neural networks

Full Project – A web-based intrusion detection and prevention system using neural networks

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

INTRODUCTION

1.1     BACKGROUND OF THE STUDY

With the presence of information technology in this age; data can be stored, manipulated, transferred and processed but there are also some agents that want to make use of the data for negative intentions. Intrusions usually occur when unauthorized access is gained by an attacker to a valid users account so as to perform malicious deeds while masquerading as a real user. In order to prevent this, it is advisable to employ the use intrusion prevention and detection systems. An Intrusion detection and prevention system could be a software and/or a hardware that monitors a system or a network of systems against any malicious activity. An intrusion detection and prevention system has two different functions; prevention and detection. Prevention is the act of avoiding the intrusion while detection is observing any malicious activity that is present in a system.

Examples of intrusions include Attempted break-in/ Masquerade attacks which is an attack that uses fake identity to gain unauthorised access to private computer information through legitimate access identification. They are usually detected by a typical behaviour profile or violation of security constraints. This is an example under anomaly based intrusion system. Another example is the penetration of security control systems. This can be an unauthorised simulated attack on a computer system that looks for security weakness, potentially gaining access to the system’s features data. It can be detected by monitoring specific pattern of activity. Also, Leakage is another example of intrusion, this happens when a system reveals some information to unauthorised parties. It can be detected by a typical use of system resources. Malicious software are also intrusions that should be avoided, it can be any software used to disrupt computer operations, gather information and gain access to private systems. It is detected by typical behaviour profiles, violation of security constraints or the use of special privileges.

There are two intrusion detection based methods; Misuse based intrusion detection: which can also be knowledge based detection. (Devikrishna et al, 2013) It searches for activities that are similar to known signatures of intrusions.  It detects any abnormal activities and renders any other activity in the system as normal. Its greatest advantage is the presence of low false positives but it is unable to detect unknown attacks, it can only detect attacks that have a pattern in the system. The second method is the Anomaly based intrusion detection which can also be known as behaviour based detection. (Devikrishna et al, 2013) It detects by searching for any abnormal network traffic. It is the opposite of misuse based detection in the sense that rather than detecting abnormal activities, it detects normal activities and renders any other activity as abnormal. It is very good in detecting unknown attacks i.e. doesn’t need prior knowledge of the attack but it has a high rate of false positives.

There are several intrusion detection and prevention systems but this research will be focused on developing a Neural Network Intrusion Detection and Prevention (NNIDP) systems. A neural network is the imitation of the connection of the human brain with the nerve cells of the body. The adaptation of a neural network makes intrusion detection systems more efficient. An NNIDP can be trained to learn patterns in a system so as to detect intrusions by recognizing patterns of intrusions and thereby preventing them. There are three steps involved in making a neural network; pre-process the data, train the network and test the data. (Om & Sarkar, 2010)

 

1.2     STATEMENT OF THE PROBLEM

The presence and activities of intruders to forcefully gain access to highly classified and private information especially those stored on the database has rapidly increased over time as a result of technological growth. In curbing this, intrusion detection and prevention systems has been developed to detect and prevent intruders who might want to jeopardize system efficiency as a result of intrusion. The pattern recognition ability and machine learning ability of the Artificial Neural Network has brought advanced IDPS which can effectively detect and prevent intruders. Thus the need to develop an advanced Artificial Neural Network Intrusion Detection and Prevention system for combatting intrusions effectively.

 

1.3     AIM AND OBJECTIVES

The aim of this research is to develop an Intrusion Detection and Prevention System that uses a Neural Network model for the detection and prevention of web attacks. The specific objectives are to:

  1. Survey web attack methods so as to identify intrusion attempts and aid effective detection of intrusion attempts.
  2. Design an intrusion detection and prevention system as a third party security software to enhance the intrusion detection and prevention process.
  3. Develop a robust database that will keep records of intrusion attempts and identify the source thereby preventing the intruders from gaining further access.
  4. Implement a Neural network technology on the Intrusion Detection System so as to effectively enhance the system. 

1.4              METHODOLOGY

To achieve the set objectives, the following methodology will be adopted.

  1. An extensive literature review will be done so as to determine up-to-date intrusions attacks and attempts and also to acquire suitable tools in developing the IDPS.
  2. Software development tools like Java Server Pages (JSP), Apache Tomcat, CSS, HTML, and Bootstrap will be used to develop and implement the Intrusion detection and prevention System (IDPS).
  3. MySQL DBMS will be used to develop the database.
  4. The Pattern matching algorithm will be adopted in the development of the Neural Network in the IDPS.

1.5     SCOPE OF STUDY

The system will be limited to the detection of web attacks and will only implement pattern matching as the neural network algorithm. The research work will not cover other types of intrusion attacks neither will it cover other ANN algorithms.

1.6      SIGNIFICANCE OF THE STUDY

The successful completion of this project will:

  1. Add to the already existing solutions in preventing intrusions.
  2. Improve the security of data especially the ones acquired from websites.
  3. Highlight diverse web attacks and possible ways of tackling them.
  4. Prove that pattern matching algorithm can effectively detect and prevent intrusions.

1.7     ORGANIZATION OF CHAPTERS

Chapter one is the introduction to the project. It highlights what the project is about and what will be done in subsequent chapters.

Chapter two is the literature review which will discuss the related works, shed more light on IDPS, enlighten about ANN and web attacks, and discuss different neural network algorithms.

Chapter three is the methodology, it will contain the analysis of the system, the design methodology, the system specifications and requirements.

Chapter four is the design and implementation of the system, it entails all the information about the system, screenshots of the system, description of how the system functions and how it is tested.

Chapter five is the summary, conclusion and further recommendations. It gives a summary of the entire project and also some recommendations.

 

 

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

Full Project – A web-based intrusion detection and prevention system using neural networks

Click here to Get The Complete Research Project Chapter 1-5

RESEARCH PROJECT CONTENTS
CHAPTER ONE - INTRODUCTION
1.1 Background of the study
1.2 Statement of problem
1.3 Objective of the study
1.4 Research Hypotheses
1.5 Significance of the study
1.6 Scope and limitation of the study
1.7 Definition of terms
1.8 Organization of the study
CHAPETR TWO – LITERATURE REVIEW
2.1. Introduction
2.2. Conceptual Framework
2.3. Theoretical Framework
2.4 Empirical Review
CHAPETR THREE - RESEARCH METHODOLOGY
3.1 Research Design
3.2 Study Area
3.3 Population of the Study
3.4 Sample Size and Sampling Technique
3.5 Instrument for Data Collection
3.6 Validity of the Instrument
3.7 Reliability of the Instrument
3.8 Method of Data Collection
3.9 Method of Data Analysis
3.9 Method of Data Analysis
3.10 Ethical Considerations
CHAPTER FOUR - DATA PRESENTATION AND ANALYSIS
4.1. Introduction
4.2 Demographic Profiles of Respondents
4.2 Research Questions
4.3. Testing of Research Hypothesis
4.4 Discussion of Findings
CHAPTER FIVE – SUMMARY, CONCLUSION & RECOMMENDATIONS
5.1 Introduction
5.2 Summary
5.3 Conclusion
5.4 Recommendation
REFERENCES
APPENDIX


Frequently Asked Questions | Https://eduschooler.com

Frequently Asked Questions

How do I get my choice complete project on any topic?
Simply click on the Download button above and follow the procedure stated.
I have a fresh topic that is not on your website. How do I go about it?
Chat with us on WhatsApp or contact our Instant Help Desk for a custom research project on your topic.
How fast can I get this complete project on any project topic?
Within 15 minutes if you want this exact project topic without adjustment.
Is it a complete research project or just materials?
It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data.
What if I want to change the case study for this topic?
Chat with Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
How will I get my complete project?
Your Complete Project Material will be sent to your Email Address in Ms Word document format.
Can I get my Complete Project through WhatsApp?
Yes! We can send your Complete Research Project to your WhatsApp Number.
What if my Project Supervisor made some changes to a topic I picked from your website?
Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
Do you assist students with Assignment and Project Proposal?
Yes! Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
What if I do not have any project topic idea at all?
Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 708 7083 227.
How can I trust this site?
We are genuine and duly registered with the Corporate Affairs Commission. This site runs on Secure Sockets Layer (SSL), ensuring all transactions are highly secure and safe.
Customer Testimonials | Https://eduschooler.com

Our Customers are Happy

Ademola A.

★★★★★

I was skeptical at first, but after placing my order, my full project arrived in my email in under 15 minutes! The process was smooth, clear, and professional. Truly amazing service!

Kwabena K.

★★★★★

I needed a custom project on a new topic. Https://eduschooler.com delivered within 3 days, and the quality was outstanding. They even guided me on how to defend it. Highly recommend!

Michael H.

★★★★★

Fast, reliable, and very professional. My research project was delivered on time, with no hidden charges. The team is trustworthy and supportive.

Fatou B.

★★★★★

I got my full project in minutes and my custom request within 3 days. Their communication is clear, and the material is top-notch. Excellent experience!

James O.

★★★★★

https://eduschooler.com is a lifesaver! My project was delivered exactly as requested. The team is friendly, professional, and highly responsive. Very satisfied!

Ngozi E.

★★★★★

I was worried about paying online, but the team reassured me and delivered my complete project instantly. Transparent and professional service!

Ama S.

★★★★★

I requested a custom topic project and received it in just 3 days. The guidance and quality were excellent. I recommend eduschooler.com to everyone!

Sarah W.

★★★★★

The service is dependable and efficient. My project arrived on time, and every step was transparent. Truly a professional service I trust.

Emmanuel T.

★★★★★

Fast and reliable. My full project was delivered in minutes, and the custom project in 3 days. Communication was excellent throughout.

Aisha N.

★★★★★

Extremely satisfied with the service. My project was delivered promptly, fully transparent, and of high quality. A trustworthy academic partner!

Live Chat
Admin is typing...