Introduction
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such blocking the user or source IP address from accessing the network. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems are placed at a strategic point or points within the network to monitor traffic to and from all devices on the network. HIDS host intrusion detection system on the network. HIDS monitors the inbound and outbound pockets from the device only and will alert the user. Intrusion detection, prevention and trace back system are primarily focused on identifying possible incidents, logging information about them, attempting to stop them and reporting them to security administers. Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network or system activities for malicious activity. Guide to intrusion detection and prevention systems (IDPS). Computer security resource center, Scarf one [1].
1.1 Statement of the Problem
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:
Absence of an intrusion detection and prevention system.
Insecurity of customer information.
Inability to prevent intruders from gaining access to sensitive information stored in the computer system.
Low level of file security.
ABSTRACT
This project aims at examining pricing strategy and profit planning as a general pheno...
BACKGROUND
The intelligent phase selector is a system that is capable of comparing three phases and switching automatically to any of the...
ABSTRACT &...
Abstract
Practical is a key factor in engaging, enthusing and inspiring students, thus, stimulating lif...
ABSTRACT
This project is aimed at producing black and brown polish of good quality. For clearity, pol...
INTRODUCTION
Stylistics is the study and interpretation of texts from literary and linguistic perspect...
ABSTRACT
Ensete gilletii commonly called wild banana, is ethno-medicinally used for the treatment of diarrhea, dysentery, typhoid, stomac...
Background of the study
Education is the bed rock of any culture that is determined to strive/survive i...
ABSTRACT
Chronic inflammation has been implicated in most non-communicable/chronic degenerative diseases including age-related cancers. Z...
BACKGROUND TO THE STUDY
Tuoyo (1982) pointed out the electricity occupies a strategic position in the social and indust...