Background of the Study
With the rapid expansion of digital services in educational institutions, the risk of cyber-attacks, including unauthorized access and data breaches, has become a significant concern. The University of Abuja, located in Gwagwalada LGA, FCT Abuja, is no exception. Intrusion Detection Systems (IDS) are essential in identifying and responding to potential threats to university networks and data. Traditionally, IDS have relied on rule-based systems that use predefined rules to detect suspicious activities. However, the increasing sophistication of cyber-attacks has led to the development of Machine Learning (ML) approaches, which allow IDS to learn from patterns in network traffic and adapt to new, previously unseen threats. This study aims to compare the performance of rule-based IDS and ML-based IDS in detecting network intrusions at the University of Abuja, focusing on detection accuracy, false positive rates, and response times.
Statement of the Problem
The University of Abuja has faced several security breaches over the years, highlighting weaknesses in the existing intrusion detection system. The rule-based IDS currently in place relies on predefined patterns and often struggles to identify novel threats. Furthermore, these systems can produce a high number of false positives, leading to unnecessary alerts and inefficiencies. The university requires a more dynamic and intelligent approach to intrusion detection, which can adapt to evolving threats. Although machine learning-based IDS have shown promise, there is limited research on their effectiveness in comparison to rule-based systems in the context of university networks.
Objectives of the Study
Research Questions
Research Hypotheses
Significance of the Study
This study will provide valuable insights into the application of machine learning techniques for intrusion detection in university networks. By comparing rule-based and machine learning-based approaches, the study will guide the University of Abuja in selecting the most effective IDS for protecting its network infrastructure. The findings will also contribute to the broader body of knowledge on IDS in educational institutions, with implications for other universities facing similar security challenges.
Scope and Limitations of the Study
The study will focus on the comparison of rule-based and machine learning-based intrusion detection systems at the University of Abuja, located in Gwagwalada LGA, FCT Abuja. The study will specifically evaluate the detection accuracy, false positives, and response times of both approaches in the university’s network. The study will not address other aspects of network security, such as firewalls or encryption systems.
Definitions of Terms
Intrusion Detection System (IDS): A security system designed to detect unauthorized access or attacks on a network or computer system.
Rule-Based IDS: An IDS that uses predefined rules and signatures to detect intrusions.
Machine Learning-Based IDS: An IDS that uses machine learning algorithms to analyze network traffic and detect anomalies or potential intrusions.
BACKGROUND OF THE STUDY
In order to transmit their messages to their target audiences or to remind them...
Background of the Study
As digitalization becomes integral to government operations, securing endpoints—the devic...
Background of the Study :
The integration of open educational resources (OER) into online learning has emerged as a transfo...
ABSTRACT
This study was carried out to examine factors influencing the implementation of safety management system for construction s...
Background of the Study
Hospital-acquired infections (HAIs), also known as nosocomial infections, are infections that patients acquire wh...
Background of the Study
Gene-drug interactions are critical for understanding drug efficacy and adverse reactions, paving...
Background of the study
Gender equality in employment has been a central theme in developmental policies globally, and adul...
Background of the Study
Cause-related marketing (CRM) refers to a marketing strategy in which a company partners with a...
Background of the Study
In the digital era, the need for secure online voting systems in universities has become increasingly important. Usm...
Chapter One: Introduction
1.1 Background of the Study
Education is a critical pillar of natio...