Full Project – Intrusion detector software for wireless ISPs
Click here to Get this Complete Project Chapter 1-5
CHAPTER ONE
- INTRODUCTION
Threats to wireless local area networks (WLANs) are numerous and potentially devastating. Security issues ranging from mis-configured wireless access points (WAPs) to session hijacking to Denial of Service (DoS) can plague a WLAN. Wireless networks are not only susceptible to TCP/IP-based attacks native to wired networks, they are also subject to a wide array of 802.11-specific threats. To aid in the defense and detection of these potential threats, WLANs should employ a security solution that includes an intrusion detection system (IDS). Even organizations without a WLAN are at risk of wireless threats and should consider an IDS solution. This paper will describe the need for wireless intrusion detection, provide an explanation of wireless intrusion detection systems, and identify the benefits and drawbacks of a wireless intrusion detection solution.
1.1 BACKGROUND OF STUDY
Federal Polytechnic Nekede Owerri Internet Service Provider is chosen as the background of study for the project.
Among the great organization and big institution is Federal Polytechnic Nekede Owerri, a tertiary institution with several employees working in the different department to achieve the set out objective of educating the human person. By edict No. 16 of 1978, the college of Technology, Owerri was established. It opened for classes on 15th December, 1978 at a temporary site in the premises of the government trade centre, along Egbu Road Owerri, with an initial in-take of 275 students. In October, 1980, the college moved to its permanent site at Nekede near Owerri, by which time the college had grown to 1,350. The name of the college was later changed to the Polytechnic, Nekede, Owerri by Federal Amendment of Decree 1993 of 1st January, 1993.
The Federal polytechnic is at present organized into the schools of:
- Business Administration and Management Technology which offers courses such as Accountancy, Public Administration, Banking/Finance etc.
- Engineering Technology which offers courses such as Mechanical engineering, Civil engineering, Computer science etc.
- Environmental design which offers courses like building technology, architectural etc.
- Industrial sciences which offers courses like science technology, food technology etc.
- General studies which offers courses like Mathematics, Statistics, humanities etc.
Each of the above mentioned schools is headed by a Dean and all the schools have department also headed by a HOD (head of department). The non-academic divisions and units’ include the registry, bursary, works, medical and health services and the student’s affairs. The units are:
Security, internal audit and public relations which are however, housed under the office of the rectory.
1.2 OBJECTIVE OF THE STUDY:
The main objective of this work is to design automated software that will aid in the total elimination of intruders from gaining access to the hiding information in our various systems.
The objective of the study focuses on the following:
- To aid in monitoring and controlling of fraudulent.
- To provide quick enquiry about information in an organization.
Furthermore, the study will show the effect in the manpower of the security department because on most occasions charging the manual information system to an automated information system will equally cause redundancy.
1.3 STATEMENT OF PROBLEM
There are difficulties experienced in the manual system or intrusion detection in an organization. These factors therefore necessitate the implementation of a computer – base system in other to overcome the short comings of the manual system of detecting intrusion. By automating the system, rate of intrude flow will be eliminated in an organization, equally the statement of the problem of the work is also be:
- To understand what intrude is all about and solutions to stop it in entirely.
- To make an effective security on all the functional inputs of the organization.
- To bring a seasonal programmer and an operator who will be taking charge of the intrusion detector software being developed.
1.4 SCOPE OF THE STUDY:
This project work focus mainly on the intrusion detector software for wireless ISPs and also provides well developed software to automate the new system.
1.5 LIMITATION OF STUDY:
The research of this work is limited Federal Polytechnic Nekede Owerri, ISPs.
Many limitations were encountered during the process of gathering the information for the development of this project work to this extent. It was not an easy one, so many constraints was encountered during the collection of data.
The limitation focuses on the following constraints:
- Financial constraints: The cost of sourcing for information and data that are involved in this work is high in the sense that we all know that information is money.
- Time: A lot of time was involved in writing and developing this work.
1.5 PURPOSE OF THE STUDY
The primary purpose of a WISP is to prevent unauthorized network access to local area networks and other information assets by wireless devices. These systems are typically implemented as an overlay to an existing Wireless LAN infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization. Some advanced wireless infrastructure has integrated WISP capabilities.
Large organizations with many employees are particularly vulnerable to security breaches[1] caused by rogue access points. If an employee (trusted entity) in a location brings in an easily available wireless router, the entire network can be exposed to anyone within range of the signals.
In July 2009, the PCI Security Standards Council published wireless guidelines[2] for PCI DSS recommending the use of WISP to automate wireless scanning for large organizations.
1.6 SIGNIFICANCE OF STUDY:
The Intrusion Detector Software for wireless ISPs would lead to an effective and comprehensive intrusion control in an organization. For examples, computerized verification of illegal access of customers e-mail, computerized verification of signatures. In a matter of seconds the computer system enhanced to do all these tasks, then all criminal and inrusion minded people will desist from such acts.
1.7 DEFINITION OF TERMS:
Get the Complete Project
This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.
Click here to Get this Complete Project Chapter 1-5
You can also check other Research Project here:
- Accounting Research Project
- Adult Education
- Agricultural Science
- Banking & Finance
- Biblical Theology & CRS
- Biblical Theology and CRS
- Biology Education
- Business Administration
- Computer Engineering Project
- Computer Science 2
- Criminology Research Project
- Early Childhood Education
- Economic Education
- Education Research Project
- Educational Administration and Planning Research Project
- English
- English Education
- Entrepreneurship
- Environmental Sciences Research Project
- Guidance and Counselling Research Project
- History Education
- Human Kinetics and Health Education
- Management
- Maritime and Transportation
- Marketing
- Marketing Research Project 2
- Mass Communication
- Mathematics Education
- Medical Biochemistry Project
- Organizational Behaviour
- Political Science
- Psychology
- Public Administration
- Public Health Research Project
- More Research Project
- Transportation Management
- Nursing
Full Project – Intrusion detector software for wireless ISPs