091-2230-8145     |      dataprojectng@gmail.com
1

1. Design and Implementation of an Intrusion Tolerant System

Abstract

The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...

Read more

2. MULTI-LEVEL INTRUSION DETECTION AND LOG MANAGEMENT SYSTEM IN CLOUD COMPUTING

INTRODUCTION

As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...

Read more

3. DESIGN OF INTRUSION DETECTION AND PREVENTION SYSTEM IN MICRO FINANCE BANK IN IKOT EKPENE

Introduction

An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...

Read more

4. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE

Statement of the Problem

The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:

  1. Absence of an  intrusion  detection and prevention system.
  2. ...
Read more

5. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE STUDY

  1.   Introduction

An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...

Read more

6. THE DETECTION AND PREVENTION OF SNIFFING ON NETWORKS

ABSTRACT

With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...

Read more

7. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more
whatsapp