| dc.contributor.author | Mohamed, Ala Eltahir Abdalla | |
| dc.contributor.author | Supervisor, - Ahmed Abdalla Mohammed | |
| dc.date.accessioned | 2019-10-30T11:27:23Z | |
| dc.date.available | 2019-10-30T11:27:23Z | |
| dc.date.issued | 2019-04-10 | |
| dc.identifier.citation | Mohamed, Ala Eltahir Abdalla . Implementation of Packet-Based and Flow-Based Network Intrusion Detection System / Ala Eltahir Abdalla Mohamed ; Ahmed Abdalla Mohammed .- Khartoum: Sudan University of Science and Technology, college of Engineering, 2019 .- 86p. :ill. ;28cm .- M.Sc. | en_US |
| dc.identifier.uri | http://repository.sustech.edu/handle/123456789/23631 | |
| dc.description | Thesis | en_US |
| dc.description.abstract | Security became an important issue in networks world. Intrusion Detection Systems (IDSs) are one of the most tested and reliable technologies to monitor and detect attacks. Network Intrusion Detection Systems (NIDSs) collects network traffic information from some point on the network or computer system and then use this information to secure the network. There are two methods basis on the source of data to be analyzed in NIDSs; Packet-Based and Flow-Based. This research implements both methods to detect scanning and flooding attacks. Packet-Based NIDS is done using the misuse-based IDS Snort. Snort is an open-source project. Configured to run in NIDS mode. Attacks are launched from remote host that uses Kali tool. For Flow-Based NIDS, an algorithm is implemented with C language to detect and identify network attack based on Time-based Aggregation Traffic (TAT) feature that extracted from previous exported NetFlow record to detect several scan and Denial of Service (DoS) attacks. After implementing and testing both methods, results showed that Packet-Based can detect scanning attacks and flooding attacks very well and able to made an alert for that but Snort cannot alert every incoming packet because of the inability of Snort to analyze multiples packet in small time. For Flow-Based NIDS detect all scanning and flooding attacks correctly with False Positive almost zeroactually is 0.002 and with True Positive equal 1. Hybrid system for both inspections method is recommended to get the best feature of the both Network Intrusion Detection Systems. | en_US |
| dc.description.sponsorship | Sudan University of Science and Technology | en_US |
| dc.language.iso | other | en_US |
| dc.publisher | Sudan University of Science and Technology | en_US |
| dc.subject | Electronics Engineering | en_US |
| dc.subject | Computers and Networks | en_US |
| dc.subject | Packet-Based | en_US |
| dc.subject | Network | en_US |
| dc.title | Implementation of Packet-Based and Flow-Based Network Intrusion Detection System | en_US |
| dc.title.alternative | تنفيذ نظام لاكتشاف التسلل في الشبكات علي مستوى الحزمة وعلي مستوى التدفق | en_US |
| dc.type | Thesis | en_US |