INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEM
- Department: Computer Science
- Project ID: CPU2434
- Access Fee: ₦5,000
- Pages: 40 Pages
- Reference: YES
- Format: Microsoft Word
- Views: 426
Get this Project Materials
ABSTRACT
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we first examine the vulnerabilities of a wireless ad-hoc network, the reason why we need intrusion detection, and the reason why the current methods cannot be applied directly. We then describe the new intrusion detection and response mechanisms that we are developing for wireless ad-hoc networks.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3AIMS AND OBJECTIVES
1.4SCOPE/DELIMITATIONS
1.5LIMITATIONS/CONSTRAINTS
1.6DEFINITION OF TERMS
CHAPTER TWO
2.0LITERATURE REVIEW
CHAPTER THREE
3.0METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2DISCUSSIONS
CHAPTER FOUR
4.0FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1FUTURES
4.2IMPLICATIONS
4.3CHALLENGES
CHAPTER FIVE
5.0RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1RECOMMENDATION
5.2SUMMARY
5.3CONCLUSION
5.4REFERENCES
- Department: Computer Science
- Project ID: CPU2434
- Access Fee: ₦5,000
- Pages: 40 Pages
- Reference: YES
- Format: Microsoft Word
- Views: 426
Get this Project Materials