SUST Repository

Hybrid Based Network Intrusions Detection Systems

Show simple item record

dc.contributor.author Alfaki, Malik Khalil Mohamed
dc.contributor.author Supervisor, - Mohammed Al-Ghazali Hamza Khalil
dc.date.accessioned 2019-06-19T09:18:41Z
dc.date.available 2019-06-19T09:18:41Z
dc.date.issued 2018-08-10
dc.identifier.citation Alfaki, Malik Khalil Mohamed . Hybrid Based Network Intrusions Detection Systems / Malik Khalil Mohamed Alfaki ; Mohammed Al-Ghazali Hamza Khalil .- Khartoum: Sudan University of Science and Technology, college of Computer science and information technology, 2018 .- 98p. :ill. ;28cm .- M.Sc. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/22683
dc.description Thesis en_US
dc.description.abstract Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. The Intruder is someone without permission or privilege try to access to system resource performs unnecessary/unauthorized activities, intrusion detection means detecting unauthorized activity or attacks upon system or network. An IDS is a system that generates an alarm when suspicious activity or use on system or network when it configured its monitor the gateway or host to identify the intruder. Two type of detect method: anomaly detection (also called behaviour-based) and signature-based (also named misuse or pattern based), signature-based detection identify the intruder by matching according to predefined signature of attack, if signature match is classified as an attack, but it cannot detect the attack that is not stored in the signature database which cannot detect novel attack (zero-day attack). Anomaly detection can detect both the known and novel attack due to that anomaly detection based on the preserve profile for normal activity of system or network if any deviation is considered as an attack. This research provides a review of various Intrusion Detection Systems and its tools by focusing on SNORT IDS-an open source tool, also provide an extension for SNORT by adding pre-processor to detect anomalies, that make the system hybrid based detection which increase the rate of intruder detection. en_US
dc.description.sponsorship Sudan University of Science and Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science and Technology en_US
dc.subject Detection Systems en_US
dc.subject Hybrid Based en_US
dc.subject Network Intrusions en_US
dc.title Hybrid Based Network Intrusions Detection Systems en_US
dc.title.alternative اﻷنظمة الهجينة لإكتشاف الدخلاء في الشبكة en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account