Background of the Study
With the rapid expansion of digital services in educational institutions, the risk of cyber-attacks, including unauthorized access and data breaches, has become a significant concern. The University of Abuja, located in Gwagwalada LGA, FCT Abuja, is no exception. Intrusion Detection Systems (IDS) are essential in identifying and responding to potential threats to university networks and data. Traditionally, IDS have relied on rule-based systems that use predefined rules to detect suspicious activities. However, the increasing sophistication of cyber-attacks has led to the development of Machine Learning (ML) approaches, which allow IDS to learn from patterns in network traffic and adapt to new, previously unseen threats. This study aims to compare the performance of rule-based IDS and ML-based IDS in detecting network intrusions at the University of Abuja, focusing on detection accuracy, false positive rates, and response times.
Statement of the Problem
The University of Abuja has faced several security breaches over the years, highlighting weaknesses in the existing intrusion detection system. The rule-based IDS currently in place relies on predefined patterns and often struggles to identify novel threats. Furthermore, these systems can produce a high number of false positives, leading to unnecessary alerts and inefficiencies. The university requires a more dynamic and intelligent approach to intrusion detection, which can adapt to evolving threats. Although machine learning-based IDS have shown promise, there is limited research on their effectiveness in comparison to rule-based systems in the context of university networks.
Objectives of the Study
Research Questions
Research Hypotheses
Significance of the Study
This study will provide valuable insights into the application of machine learning techniques for intrusion detection in university networks. By comparing rule-based and machine learning-based approaches, the study will guide the University of Abuja in selecting the most effective IDS for protecting its network infrastructure. The findings will also contribute to the broader body of knowledge on IDS in educational institutions, with implications for other universities facing similar security challenges.
Scope and Limitations of the Study
The study will focus on the comparison of rule-based and machine learning-based intrusion detection systems at the University of Abuja, located in Gwagwalada LGA, FCT Abuja. The study will specifically evaluate the detection accuracy, false positives, and response times of both approaches in the university’s network. The study will not address other aspects of network security, such as firewalls or encryption systems.
Definitions of Terms
Intrusion Detection System (IDS): A security system designed to detect unauthorized access or attacks on a network or computer system.
Rule-Based IDS: An IDS that uses predefined rules and signatures to detect intrusions.
Machine Learning-Based IDS: An IDS that uses machine learning algorithms to analyze network traffic and detect anomalies or potential intrusions.
Background of the Study
Cultural rituals are integral to Hausa communities in Northern Nigeria, influencing language use a...
Background of the Study
Women’s participation in political campaign organizations has been a crucial factor in shapin...
Background of the Study :
Digital transformation is reshaping the financial services landscape globally, and Nigeria’...
Background of the Study
Digital diplomacy, or e-diplomacy, has transformed traditional statecraft by integrating digital te...
Background of the study
Democratic government was installed in Nigeria in 1999 after more than 1...
Background of the Study
In the digital age, the integrity of data has become a cornerstone of effective governance and p...
Chapter One: Introduction
1.1 Background of the Study
Print media has played a pivotal role in advocating for social justice, p...
Background of the Study
Community cohesion is a vital indicator of social stability and well-being, and early childhood ed...
Background of the Study
Public service delivery is a cornerstone of political legitimacy at the local government level. In...
Chapter One: Introduction
1.1 Background of the Study
Gender representation in local governance remains a significant issue in...