0704-883-0675     |      dataprojectng@gmail.com

Comparative Study of Rule-Based and Machine Learning Approaches in Intrusion Detection: A Case Study of University of Abuja (Gwagwalada LGA, FCT Abuja)

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
With the rapid expansion of digital services in educational institutions, the risk of cyber-attacks, including unauthorized access and data breaches, has become a significant concern. The University of Abuja, located in Gwagwalada LGA, FCT Abuja, is no exception. Intrusion Detection Systems (IDS) are essential in identifying and responding to potential threats to university networks and data. Traditionally, IDS have relied on rule-based systems that use predefined rules to detect suspicious activities. However, the increasing sophistication of cyber-attacks has led to the development of Machine Learning (ML) approaches, which allow IDS to learn from patterns in network traffic and adapt to new, previously unseen threats. This study aims to compare the performance of rule-based IDS and ML-based IDS in detecting network intrusions at the University of Abuja, focusing on detection accuracy, false positive rates, and response times.

Statement of the Problem
The University of Abuja has faced several security breaches over the years, highlighting weaknesses in the existing intrusion detection system. The rule-based IDS currently in place relies on predefined patterns and often struggles to identify novel threats. Furthermore, these systems can produce a high number of false positives, leading to unnecessary alerts and inefficiencies. The university requires a more dynamic and intelligent approach to intrusion detection, which can adapt to evolving threats. Although machine learning-based IDS have shown promise, there is limited research on their effectiveness in comparison to rule-based systems in the context of university networks.

Objectives of the Study

  1. To compare the performance of rule-based and machine learning-based intrusion detection systems at the University of Abuja.
  2. To evaluate the accuracy, false positive rates, and response times of both IDS approaches in detecting intrusions.
  3. To recommend the most effective IDS approach for securing the university’s network infrastructure.

Research Questions

  1. How do rule-based and machine learning-based intrusion detection systems compare in detecting intrusions at the University of Abuja?
  2. What are the advantages and disadvantages of rule-based and machine learning-based approaches in terms of accuracy and false positives?
  3. How do rule-based and machine learning-based IDS impact the efficiency of network security management at the University of Abuja?

Research Hypotheses

  1. Machine learning-based IDS will have a higher detection accuracy and lower false positive rate compared to rule-based IDS at the University of Abuja.
  2. Machine learning-based IDS will outperform rule-based IDS in terms of response time for detecting and mitigating network intrusions.
  3. The use of machine learning-based IDS will improve the overall efficiency and effectiveness of the University of Abuja’s network security management.

Significance of the Study
This study will provide valuable insights into the application of machine learning techniques for intrusion detection in university networks. By comparing rule-based and machine learning-based approaches, the study will guide the University of Abuja in selecting the most effective IDS for protecting its network infrastructure. The findings will also contribute to the broader body of knowledge on IDS in educational institutions, with implications for other universities facing similar security challenges.

Scope and Limitations of the Study
The study will focus on the comparison of rule-based and machine learning-based intrusion detection systems at the University of Abuja, located in Gwagwalada LGA, FCT Abuja. The study will specifically evaluate the detection accuracy, false positives, and response times of both approaches in the university’s network. The study will not address other aspects of network security, such as firewalls or encryption systems.

Definitions of Terms
Intrusion Detection System (IDS): A security system designed to detect unauthorized access or attacks on a network or computer system.
Rule-Based IDS: An IDS that uses predefined rules and signatures to detect intrusions.
Machine Learning-Based IDS: An IDS that uses machine learning algorithms to analyze network traffic and detect anomalies or potential intrusions.





Related Project Materials

The impact of cultural rituals on pragmatic language use among Hausa speakers in Northern Nigeria

Background of the Study
Cultural rituals are integral to Hausa communities in Northern Nigeria, influencing language use a...

Read more
An evaluation of the role of women in political campaign organizations in Lafia Local Government Area, Nasarawa State

Background of the Study
Women’s participation in political campaign organizations has been a crucial factor in shapin...

Read more
The impact of digital transformation on Nigeria’s banking sector: An evaluation of fintech adoption in Lagos State (2010–2020).

Background of the Study :
Digital transformation is reshaping the financial services landscape globally, and Nigeria’...

Read more
An assessment of digital diplomacy’s evolution in modern statecraft: A case study of e-diplomacy tools in Kano State

Background of the Study
Digital diplomacy, or e-diplomacy, has transformed traditional statecraft by integrating digital te...

Read more
ECONOMIC IMPLICATION OF BOKO HARAM INSURGENCY IN NIGERIA

​​​​​​​Background of the study

Democratic government was installed in Nigeria in 1999 after more than 1...

Read more
The Role of IT Audits in Improving Data Integrity in Nigerian Public Institutions: A Case Study of the National Identity Management Commission (NIMC)

Background of the Study

In the digital age, the integrity of data has become a cornerstone of effective governance and p...

Read more
The Role of Print Media in Advocacy for Women’s Rights in Gusau Local Government, Zamfara

Chapter One: Introduction

1.1 Background of the Study

Print media has played a pivotal role in advocating for social justice, p...

Read more
An investigation into the role of early childhood education in fostering community cohesion in Dawakin Tofa Local Government Area, Kano State

Background of the Study
Community cohesion is a vital indicator of social stability and well-being, and early childhood ed...

Read more
The impact of public service delivery on political legitimacy at the local level: A study of Isokan Local Government Area, Osun State

Background of the Study
Public service delivery is a cornerstone of political legitimacy at the local government level. In...

Read more
An Assessment of Gender Representation in Local Governance: The Case of Wukari LGA, Taraba State

Chapter One: Introduction

1.1 Background of the Study

Gender representation in local governance remains a significant issue in...

Read more
Share this page with your friends




whatsapp