091-2230-8145     |      dataprojectng@gmail.com

DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

  • Project Research
  • 1-5 Chapters
  • Qualitative
  • Content
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypassed or overcome by new exploits. One of their notable advantages is their ability to potentially identify new compromises resulting from unfamiliar or unanticipated attacks, primarily through monitoring system activity rather than relying solely on signatures. Administrators can focus on their core responsibilities without the need to allocate time for updating signature databases or patching anomaly detection engines. Honeypots effectively capture various types of attacks directed towards them. This project work utilises the UML (Unified Modelling Language) object oriented design approach. The deliverables encompass the Use-case, class diagram, activity diagram, and sequence diagram. Key activities in system design involve the formulation of system-level technical requirements, the creation of top-level system designs, and the evaluation of the design's capacity to fulfil the system requirements. The system comprises various components, including the database design, class diagrams, use-case design, activity diagram design, input design, and output design. However, the honeyd.conf file was a bit challenging to understand. Even a minor typo in the script could prevent the configuration file from running smoothly. Nevertheless, the utilisation of honeypots enables researchers and security professionals to discreetly observe malicious attackers, with the aim of gaining insights into the most up-to-date techniques and exploits in real-time.

 

CHAPTER ONE

GENERAL INTRODUCTION

Research works and experiments have convinced security experts that Network Intrusion Detection Systems (NIDS) alone are not capable of securing the computer networks from internal and external threats completely. (Renuka et al., 2011). An intrusion detection system (IDS) is a device or software application that monitors systems for malicious activities and policy violations and produces reports to a management station. Intrusion detection systems are primarily focused on identifying possible incidents, logging information about them and reporting attempts. Organizations use these systems for identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. The goals of intrusion detection systems are to use all available information in order to detect both attacks by external hackers and misuse by insiders. IDSs are based on the belief that an attacker’s behaviour will be noticeably different from that of a legitimate user. (tzeyoung, 2009).

Intrusions can occur due to vulnerabilities in operating systems. Many common operating systems are simply not designed to operate securely. Thus, malware often is written to exploit discovered vulnerabilities in popular operating systems. Depending on the nature of the attack, many times if an operating system is compromised, it can be difficult for an IDS to recognise that the operating system is no longer legitimate. Operating Systems must be designed to better support security policies pertaining to authentication, access control and encryption. Intrusion detection uses vulnerability assessment (sometimes referred to as scanning), which is a technology developed to access the security of a computer system or network. Hackers can use malware to record keyboard strokes, then send that account and password information by hacking sites which store those details through the use of tools such as scanning tools; which they use to survey and analyse system characteristics and remote management tools; used by system’s administrators to manage a network by managing and controlling systems devices from a remote location.

According to the Information Assurance Technology Analysis Center (IATAC), 2009; IDSs are generally made up of sensors, analysers, user interfaces and honeypot. Sensors are deployed in a network or on a device to collect data, they take input from various sources, including network packets, log files and system call traces. Analysers in an IDS collect data forwarded by sensors and then determine if an intrusion has actually occurred. The user interface of the IDS gives the end user a view and way to interact with the system. Through the interface, a user can control and configure the system. Honeypot is a fully deployed IDS which administrators deploy as a bait or decoy for intruders, it can be used as early warning systems of an attack, decoys from critical systems and data collection sources for attack analysis.

Provos and Holz (2007), defined honeypot as ‘A closely monitored computing resource that we want to be probed, attacked or compromised.’ The value of a honeypot is weighed by the information that can be obtained from it. To detect malicious behaviour, a network intrusion detection system (NIDS) requires signatures of known attacks and often fail to detect compromises that were unknown at the time it was deployed. Also NIDSs produces erroneous results called false positives and false negatives, which occur when the NIDS erroneously detects a problem with benign traffic and when unwanted traffic is undetected by the NIDS respectively. On the other hand, honeypots can detect vulnerabilities that are not yet understood. For instance, a compromise can be detected by observing network traffic leaving the honeypot, even if the means of the exploit has never been seen before. Honeypots consists of unreal services such as mail, telnet, HTTP etc, database for logging, packet dispatcher and protocols such as ICMP, TCP and UDP.





Related Project Materials

ABORTION AS A CAUSATIVE FACTOR TO THE INCREASE IN MORTALITY RATE AMONG ADOLESCENT AT AGES 13 to 20

ABSTRACT

This study is on abortion as a causative factor to the increase in mortality rate among adolescent in Plateau State of Nigeria....

Read more
STIGMATIZATION AND ALIENATION OF UNMARRIED TEENAGE MOTHERS IN SUBCULTURE

Abstract

This study attempts to examine Stigmatization and Alienation of Unmarried Teenage Mothers in Sub-Cultu...

Read more
DRUGS ABUSE IN BAYELSA AND RIVERS STATE FROM 2010-2020

​​​​​​​Background of the Study

Various people describe drugs in a variety of ways. By definition, a dru...

Read more
THE INFLUENCE OF BEAUTY MAGAZINE CONSUMPTION ON THE BEAUTY CHOICE AMONG UNIVERSITY STUDENTS

ABSTRACT

This study investigates the relationship that exists between Beauty Magazine Consumption and beauty choice of consumers. Specifi...

Read more
THE MICROBIOLOGICAL QUALITY CONTROL OF SOYMILK BEVERAGE SOLD IN INSITITUE OF MANGEMENT AND TECHNOLOGY CAMPUS 3 ENUGU.

ABSTRACT

The study is aimed at evaluating the microbiological quality control of soymilk beverage sold...

Read more
FACTORS AFFECTING HOUSING DELIVERY

ABSTRACT

Housing shortage is one of the most serious developmental challenges presently confronting Nigeria. Stakeholder...

Read more
PROLIFERATION OF UNREGISTERED ESTATE AGENT IN REAL ESTATE MARKET

Abstract

This research project is meant to identify the impact proliferation of unregistered estate in abuja Municipalit...

Read more
APPLICATION OF INFORMATION TECHNOLOGY (IT) AT PRE-CONTRACT STAGE OF BUILDING PROJECTS

ABSTRACT

This study assessed the methods that the design team members use to manage the information tha...

Read more
STUDY ON THE EFFICACY AND SAFETY OF ARTEMETHER/LUMEFANTRINE IN THE TREATMENT OF UNCOMPLICATED PLASMODIUM FALCIPARUM MALARIA AMONGST CHILDREN IN NIGERIA

ABSTRACT

Globally, malaria is a major health concern because it causes high morbidity and mortality particularly in children under 5 year...

Read more
FARM POWER SOURCES AND UTILIZATION IN ENUGU STATE

BACKGROUND OF STUDY

Power is required to develop and execute the activities involved in agricultural pr...

Read more
Share this page with your friends




whatsapp