Yinka-Banjo, Chika and Alli, Pwamoreno and Misra, Sanjay and Jonathan, Oluranti and Ahuja, Ravin (2022) Intrusion Detection Using Anomaly Detection Algorithm and Snort. In: Illumination of Artificial Intelligence in Cyber Security and Forensics. Springer.
PDF
Download (403kB) |
Abstract
Many organizations and businesses are all delving into crafting out an online presence for themselves. This could either be in the form of websites or mobile apps. Many advantages come from an online presence; however, there are some drastic disadvantages that, if left unchecked, could disrupt any business or organization. Chief amongst these disadvantages is the aspect of security. However, many of the techniques that some organizations utilize to guard against unwanted access have been inadequate, and as a result, many unauthorized system break-ins have been reported. This is not made any better by the fact that certain applications used in hacking or system breach are now commonplace. Therefore, the focus of this work is to take an Intrusion Detection System (IDS) for a local network to detect network intrusion. A statistical approach, as well as a binomial classification, was used for simplicity in classification. The result shows the outlier value for each item considered; a 1 depicts an attack, a 0 depicts normalcy. The results are promising in dictating intrusion and anomalies in an IDS system.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | :Network security, Intrusion detection system, Snort, Computer network, Cyber security, Anomaly detection, Outlier detection |
Subjects: | Q Science > Q Science (General) Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science |
Depositing User: | AKINWUMI |
Date Deposited: | 04 Oct 2022 12:58 |
Last Modified: | 04 Oct 2022 13:01 |
URI: | http://eprints.covenantuniversity.edu.ng/id/eprint/16266 |
Actions (login required)
View Item |