Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1011
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOLUSEYE-PAUL, ISAAC-
dc.date.accessioned2022-11-03T12:38:43Z-
dc.date.available2022-11-03T12:38:43Z-
dc.date.issued2022-08-
dc.identifier.citationOLUSEYE-PAUL ISAAC (2022). IMPLEMENTATION OF AN INTRUSION DETECTION SYSTEM ON MTU NETWORKen_US
dc.identifier.other18010301032-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1011-
dc.description.abstractCyber-attacks are growing more complex, posing greater challenges in detecting breaches effectively. Failure to prevent breaches could jeopardize security services' credibility, including data confidentiality, integrity, and availability, and academic institutions' reputations have not been left behind in this. To combat computer security threats, a variety of intrusion detection methods have been proposed in the literature. The interest of this work is to adopt an Intrusion Detection System (IDS) for academic institutions to provide early detection and prevent network intrusion. The idea is to provide an integrated system that will minimize the weaknesses of the different intrusion prevention techniques while putting to the most effective use the strength of each of them. It also talks about future research challenges to stop these kinds of attacks and make computer systems safer by showing how attackers try to avoid being caught. Malware, intrusion detection systems, and anomaly detection are some of the terms used in this paper.en_US
dc.language.isoenen_US
dc.publisherMountain Top Universityen_US
dc.subjectMalwareen_US
dc.subjectIntrusion detection systemen_US
dc.subjectAnomaly detectionen_US
dc.subjectSnorten_US
dc.subjectPfsenseen_US
dc.titleIMPLEMENTATION OF AN INTRUSION DETECTION SYSTEM ON MTU NETWORKen_US
dc.typeOtheren_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
IMPLEMENTATION OF AN INTRUSION DETECTION SYSTEM ON MTU NETWORK(Worked on) (1).pdf2.25 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.