Yinka-Banjo, Chika and Alli, Pwamoreno and Misra, Sanjay and Jonathan, Oluranti and Ahuja, Ravin (2022) Intrusion Detection Using Anomaly Detection Algorithm and Snort. In: Illumination of Artificial Intelligence in Cybersecurity and Forensics. Springer, Cham, pp. 45-70. ISBN ISBN978-3-030-93452-1 Online ISBN978-3-030-93453-8
PDF
Download (116kB) |
Abstract
Many organizations and businesses are all delving into crafting out an online presence for themselves. This could either be in the form of websites or mobile apps. Many advantages come from an online presence; however, there are some drastic disadvantages that, if left unchecked, could disrupt any business or organization. Chief amongst these disadvantages is the aspect of security. However, many of the techniques that some organizations utilize to guard against unwanted access have been inadequate, and as a result, many unauthorized system break-ins have been reported. This is not made any better by the fact that certain applications used in hacking or system breach are now commonplace. Therefore, the focus of this work is to take an Intrusion Detection System (IDS) for a local network to detect network intrusion. A statistical approach, as well as a binomial classification, was used for simplicity in classification. The result shows the outlier value for each item considered; a 1 depicts an attack, a 0 depicts normalcy. The results are promising in dictating intrusion and anomalies in an IDS system.
Item Type: | Book Section |
---|---|
Subjects: | Q Science > QA Mathematics Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science |
Depositing User: | Patricia Nwokealisi |
Date Deposited: | 24 Jul 2024 14:20 |
Last Modified: | 24 Jul 2024 14:20 |
URI: | http://eprints.covenantuniversity.edu.ng/id/eprint/18302 |
Actions (login required)
View Item |