0704-883-0675     |      dataprojectng@gmail.com

Comparative Study of Rule-Based and Machine Learning Approaches in Intrusion Detection: A Case Study of University of Abuja (Gwagwalada LGA, FCT Abuja)

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
With the rapid expansion of digital services in educational institutions, the risk of cyber-attacks, including unauthorized access and data breaches, has become a significant concern. The University of Abuja, located in Gwagwalada LGA, FCT Abuja, is no exception. Intrusion Detection Systems (IDS) are essential in identifying and responding to potential threats to university networks and data. Traditionally, IDS have relied on rule-based systems that use predefined rules to detect suspicious activities. However, the increasing sophistication of cyber-attacks has led to the development of Machine Learning (ML) approaches, which allow IDS to learn from patterns in network traffic and adapt to new, previously unseen threats. This study aims to compare the performance of rule-based IDS and ML-based IDS in detecting network intrusions at the University of Abuja, focusing on detection accuracy, false positive rates, and response times.

Statement of the Problem
The University of Abuja has faced several security breaches over the years, highlighting weaknesses in the existing intrusion detection system. The rule-based IDS currently in place relies on predefined patterns and often struggles to identify novel threats. Furthermore, these systems can produce a high number of false positives, leading to unnecessary alerts and inefficiencies. The university requires a more dynamic and intelligent approach to intrusion detection, which can adapt to evolving threats. Although machine learning-based IDS have shown promise, there is limited research on their effectiveness in comparison to rule-based systems in the context of university networks.

Objectives of the Study

  1. To compare the performance of rule-based and machine learning-based intrusion detection systems at the University of Abuja.
  2. To evaluate the accuracy, false positive rates, and response times of both IDS approaches in detecting intrusions.
  3. To recommend the most effective IDS approach for securing the university’s network infrastructure.

Research Questions

  1. How do rule-based and machine learning-based intrusion detection systems compare in detecting intrusions at the University of Abuja?
  2. What are the advantages and disadvantages of rule-based and machine learning-based approaches in terms of accuracy and false positives?
  3. How do rule-based and machine learning-based IDS impact the efficiency of network security management at the University of Abuja?

Research Hypotheses

  1. Machine learning-based IDS will have a higher detection accuracy and lower false positive rate compared to rule-based IDS at the University of Abuja.
  2. Machine learning-based IDS will outperform rule-based IDS in terms of response time for detecting and mitigating network intrusions.
  3. The use of machine learning-based IDS will improve the overall efficiency and effectiveness of the University of Abuja’s network security management.

Significance of the Study
This study will provide valuable insights into the application of machine learning techniques for intrusion detection in university networks. By comparing rule-based and machine learning-based approaches, the study will guide the University of Abuja in selecting the most effective IDS for protecting its network infrastructure. The findings will also contribute to the broader body of knowledge on IDS in educational institutions, with implications for other universities facing similar security challenges.

Scope and Limitations of the Study
The study will focus on the comparison of rule-based and machine learning-based intrusion detection systems at the University of Abuja, located in Gwagwalada LGA, FCT Abuja. The study will specifically evaluate the detection accuracy, false positives, and response times of both approaches in the university’s network. The study will not address other aspects of network security, such as firewalls or encryption systems.

Definitions of Terms
Intrusion Detection System (IDS): A security system designed to detect unauthorized access or attacks on a network or computer system.
Rule-Based IDS: An IDS that uses predefined rules and signatures to detect intrusions.
Machine Learning-Based IDS: An IDS that uses machine learning algorithms to analyze network traffic and detect anomalies or potential intrusions.





Related Project Materials

IMPACT OF GOOD RELATIONSHIP AMONG WORKERS ON THEIR OVERALL PERFORMANCE

BACKGROUND OF THE STUDY

In order to transmit their messages to their target audiences or to remind them...

Read more
THE IMPACT OF ARTIFICIAL INTELLIGENCE FOR ENDPOINT PROTECTION IN GOVERNMENT INSTITUTIONS: A CASE STUDY OF KADUNA STATE ICT HUB

Background of the Study

As digitalization becomes integral to government operations, securing endpoints—the devic...

Read more
An evaluation of the role of open educational resources (OER) in online learning for secondary school students in Maiduguri East LGA, Borno State

Background of the Study :
The integration of open educational resources (OER) into online learning has emerged as a transfo...

Read more
ANALYSIS OF FACTORS INFLUENCING THE IMPLEMENTATION OF SAFETY MANAGEMENT SYSTEM FOR CONSTRUCTION SITES IN OWERRI

ABSTRACT

This study was carried out to examine factors influencing the implementation of safety management system for construction s...

Read more
An investigation of hospital-acquired infections and their statistical impact on patient outcomes in Zamfara State

Background of the Study

Hospital-acquired infections (HAIs), also known as nosocomial infections, are infections that patients acquire wh...

Read more
Analysis of the Role of Machine Learning in Studying Gene-Drug Interactions: A Case Study of Ibrahim Badamasi Babangida University, Lapai, Niger State

Background of the Study
Gene-drug interactions are critical for understanding drug efficacy and adverse reactions, paving...

Read more
An evaluation of adult education in promoting gender equality in job opportunities in Jos South Local Government Area, Plateau State

Background of the study
Gender equality in employment has been a central theme in developmental policies globally, and adul...

Read more
An Appraisal of the Impact of Cause-Related Marketing on Brand Image: A Case Study of Coca-Cola Nigeria in Kwara State

Background of the Study

Cause-related marketing (CRM) refers to a marketing strategy in which a company partners with a...

Read more
Implementation of Secure Online Voting Systems for University Student Elections: A Case Study of Usmanu Danfodiyo University, Sokoto (Wamako LGA, Sokoto State)

Background of the Study
In the digital era, the need for secure online voting systems in universities has become increasingly important. Usm...

Read more
An investigation of intergovernmental collaboration in education development in Kano South Local Government Area, Kano State

Chapter One: Introduction

1.1 Background of the Study

Education is a critical pillar of natio...

Read more
Share this page with your friends




whatsapp