Full Project – Intrusion detector software for wireless ISPs

Full Project – Intrusion detector software for wireless ISPs

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

  • INTRODUCTION

Threats to wireless local area networks (WLANs) are numerous and potentially devastating. Security issues ranging from mis-configured wireless access points (WAPs) to session hijacking to Denial of Service (DoS) can plague a WLAN. Wireless networks are not only susceptible to TCP/IP-based attacks native to wired networks, they are also subject to a wide array of 802.11-specific threats. To aid in the defense and detection of these potential threats, WLANs should employ a security solution that includes an intrusion detection system (IDS). Even organizations without a WLAN are at risk of wireless threats and should consider an IDS solution. This paper will describe the need for wireless intrusion detection, provide an explanation of wireless intrusion detection systems, and identify the benefits and drawbacks of a wireless intrusion detection solution.

 

 

1.1  BACKGROUND OF STUDY

Federal Polytechnic Nekede Owerri Internet Service Provider is chosen as the background of study for the project.

Among the great organization and big institution is Federal Polytechnic Nekede Owerri, a tertiary institution with several employees working in the different department to achieve the set out objective of educating the human person. By edict No. 16 of 1978, the college of Technology, Owerri was established. It opened for classes on 15th December, 1978 at a temporary site in the premises of the government trade centre, along Egbu Road Owerri, with an initial in-take of 275 students. In October, 1980, the college moved to its permanent site at Nekede near Owerri, by which time the college had grown to 1,350. The name of the college was later changed to the Polytechnic, Nekede, Owerri by Federal Amendment of Decree 1993 of 1st January, 1993.

The Federal polytechnic is at present organized into the schools of:

  1. Business Administration and Management Technology which offers courses such as Accountancy, Public Administration, Banking/Finance etc.
  2. Engineering Technology which offers courses such as Mechanical engineering, Civil engineering, Computer science etc.
  • Environmental design which offers courses like building technology, architectural etc.
  1. Industrial sciences which offers courses like science technology, food technology etc.
  2. General studies which offers courses like Mathematics, Statistics, humanities etc.

Each of the above mentioned schools is headed by a Dean and all the schools have department also headed by a HOD (head of department). The non-academic divisions and units’ include the registry, bursary, works, medical and health services and the student’s affairs. The units are:

Security, internal audit and public relations which are however, housed under the office of the rectory.

 

1.2  OBJECTIVE OF THE STUDY:

The main objective of this work is to design automated software that will aid in the total elimination of intruders from gaining access to the hiding information in our various systems.

The objective of the study focuses on the following:

  1. To aid in monitoring and controlling of fraudulent.
  2. To provide quick enquiry about information in an organization.

Furthermore, the study will show the effect in the manpower of the security department because on most occasions charging the manual information system to an automated information system will equally cause redundancy.

 

1.3  STATEMENT OF PROBLEM

There are difficulties experienced in the manual system or intrusion detection in an organization. These factors therefore necessitate the implementation of a computer – base system in other to overcome the short comings of the manual system of detecting intrusion. By automating the system, rate of intrude flow will be eliminated in an organization, equally the statement of the problem of the work is also be:

  1. To understand what intrude is all about and solutions to stop it in entirely.
  2. To make an effective security on all the functional inputs of the organization.
  3. To bring a seasonal programmer and an operator who will be taking charge of the intrusion detector software being developed.

1.4  SCOPE OF THE STUDY:

This project work focus mainly on the intrusion detector software for wireless ISPs and also provides well developed software to automate the new system.

 

1.5  LIMITATION OF STUDY:

The research of this work is limited Federal Polytechnic Nekede Owerri, ISPs.

Many limitations were encountered during the process of gathering the information for the development of this project work to this extent. It was not an easy one, so many constraints was encountered during the collection of data.

The limitation focuses on the following constraints:

  1. Financial constraints: The cost of sourcing for information and data that are involved in this work is high in the sense that we all know that information is money.
  2. Time: A lot of time was involved in writing and developing this work.

1.5    PURPOSE OF THE STUDY

The primary purpose of a WISP is to prevent unauthorized network access to local area networks and other information assets by wireless devices. These systems are typically implemented as an overlay to an existing Wireless LAN infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization. Some advanced wireless infrastructure has integrated WISP capabilities.

Large organizations with many employees are particularly vulnerable to security breaches[1] caused by rogue access points. If an employee (trusted entity) in a location brings in an easily available wireless router, the entire network can be exposed to anyone within range of the signals.

In July 2009, the PCI Security Standards Council published wireless guidelines[2] for PCI DSS recommending the use of WISP to automate wireless scanning for large organizations.

1.6  SIGNIFICANCE OF STUDY:

The Intrusion Detector Software for wireless ISPs would lead to an effective and comprehensive intrusion control in an organization. For examples, computerized verification of illegal access of customers e-mail, computerized verification of signatures. In a matter of seconds the computer system enhanced to do all these tasks, then all criminal and inrusion minded people will desist from such acts.

1.7  DEFINITION OF TERMS:

 

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

Full Project – Intrusion detector software for wireless ISPs