Download this complete Project material titled; Intrution Detection Prevention And Trace Back System with abstract, chapters 1-5, references, and questionnaire. Preview Abstract or chapter one below

  • Format: PDF and MS Word (DOC)
  • pages = 65

 5,000

ABSTRACT

As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we first examine the vulnerabilities of a wireless ad-hoc network, the reason why we need intrusion detection, and the reason why the current methods cannot be applied directly. We then describe the new intrusion detection and response mechanisms that we are developing for wireless ad-hoc networks.

 

 

TABLE OF CONTENTS

TITLE PAGE

CERTIFICATION

APPROVAL

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

1.0      INTRODUCTION

1.1      STATEMENT OF PROBLEM

1.2      PURPOSE OF STUDY

1.3      AIMS AND OBJECTIVES

1.4      SCOPE/DELIMITATIONS

1.5      LIMITATIONS/CONSTRAINTS

1.6      DEFINITION OF TERMS

CHAPTER TWO

2.0      LITERATURE REVIEW

CHAPTER THREE

3.0      METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM

3.1      METHODOLOGIES FOR FACT-FINDING

3.2      DISCUSSIONS

CHAPTER FOUR

4.0      FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM

4.1      FUTURES

4.2      IMPLICATIONS

4.3      CHALLENGES

CHAPTER FIVE

5.0      RECOMMENDATIONS, SUMMARY AND CONCLUSION

5.1      RECOMMENDATION

5.2      SUMMARY

5.3      CONCLUSION

5.4      REFERENCES

 

 

CHAPTER ONE

1.0 INTRODUCTION

An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

An IDS specifically looks for suspicious activity and events that might be the result of a virusworm or hacker. This is done by looking for known intrusion signatures or attack signatures that characterize different worms or viruses and by tracking general variances which differ from regular system activity. The IDS is able to provide notification of only known attacks.

 

1.1STATEMENT OF PROBLEM

Pin code numbers that are available in the nation today is not enough to serve the teaming population and among the available line, many are faulty because of lack of maintenance. Our government is not given enough funds to MTN management.

MTN is crying daily for insufficient line, but with all this more than one line are allocated to some individuals

The Network of MTN cabinets are no longer useful and the under-ground cable system is no more serving the population currently in the society.

MTN is finding it difficult to maintain the identity and record of its subscribers, this makes it impossible for them to know the people line are allocated to and those people pin code numbers are not allocated to.

 

 

 

1.2 Purpose of study

The main aim of this study is to computerize XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks system in order to improve their transaction rate of services to their various customers.

 

1.3 Aims and objectives

  1. The present invention is to provide a method and system for generating a number stream that, using the most advanced cryptanalytic and statistical methods available.
  2. To provide a method and system for generating an asynchronous pin code number which is non-deterministic?
  3. The present invention is to provide a method and system for guaranteeing that no particular subsequence of an asynchronous pin code number or derivative value is used twice while at the same time eliminating vulnerabilities associated with keeping records of values generated.
  4. To provide a method and system for generating an asynchronous pin code number which is immune to attack and compromise.
  5. To provide a method and system for generating an asynchronous pin code number which utilizes the apparently automatic nature of ordered systems generally?

XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks has speed up the assigning of number to both individuals. It has helped many organizations to easy the heavy burden associated with manual method of assigning number to their clients. It has helped in the generation, processing and storing of effective and reliable numbers.

 

1.4 Scope/Delimitations

The research is for Ad-Hoc Networks as it is maintained with MTN Nigeria . It critically studies the current system in use defecting the problem facing the system, analysis of the problem and coming up with a modified system that well solve the current and further problem that may come up with little or no modification. This will do a lot of good.

 

1.5      Limitations/Constraints

Our time and money was our major physical problem during the course of the project work. (or should I say my time and money) with my studies and exams at hand I just have limited time to carryout this research very extensively. However, I did a detailed research work.

 

1.6 Definition of terms

Asynchronous relating to or using an electronic communication method that sends data in one direction, one character at a time

COMPUTER is an electronic device used for to accept data inform of input and process the data, store the data and has the ability to retrieve stored data.

HARDWARE is the physical component of computer

SYSTEM is the collection of all part of computer including human being.

STAFF is the person working in an organization.

STORAGE is a media for storing data/information.

DATABASE is the collection of related files.

Telephone is an instrument that sends and receives voice messages and data.

Telephone call a communication carried out using the telephone

Telephone booth an enclosed or partly enclosed space with a pay telephone in it

Telephone number the sequence of numbers that identifies a particular telephone and that must be dialed for a caller to be connected to it

  1. Hardware: This is the electromechanical part of computer system.
  2. Information: This is data that have been processed, interpreted and understood by the recipient of the message or report.
  3. Internet is a collection of computer networks that operate to common standards and enable the computes and the prog re-ram they run to communicate directly.
  4. Server: This is a process that provides requested services for clients.
  5. Software: This is a logically written program that hardware uses to perform it’s operation.
  6. System is the collection of hardware, software, data information, procedures and people.
  7. Website is a space or location customized by a company, organization or an individual which is locatable within an address on the internet.

GET THE COMPLETE PROJECT»

Do you need help? Talk to us right now: (+234) 08060082010, 08107932631 (Call/WhatsApp). Email: [email protected].

IF YOU CAN'T FIND YOUR TOPIC, CLICK HERE TO HIRE A WRITER»

Disclaimer: This PDF Material Content is Developed by the copyright owner to Serve as a RESEARCH GUIDE for Students to Conduct Academic Research.

You are allowed to use the original PDF Research Material Guide you will receive in the following ways:

1. As a source for additional understanding of the project topic.

2. As a source for ideas for you own academic research work (if properly referenced).

3. For PROPER paraphrasing ( see your school definition of plagiarism and acceptable paraphrase).

4. Direct citing ( if referenced properly).

Thank you so much for your respect for the authors copyright.

Do you need help? Talk to us right now: (+234) 08060082010, 08107932631 (Call/WhatsApp). Email: [email protected].

//
Welcome! My name is Damaris I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.