SUST Repository

Implementation of Packet-Based and Flow-Based Network Intrusion Detection System

Show simple item record

dc.contributor.author Mohamed, Ala Eltahir Abdalla
dc.contributor.author Supervisor, - Ahmed Abdalla Mohammed
dc.date.accessioned 2019-10-30T11:27:23Z
dc.date.available 2019-10-30T11:27:23Z
dc.date.issued 2019-04-10
dc.identifier.citation Mohamed, Ala Eltahir Abdalla . Implementation of Packet-Based and Flow-Based Network Intrusion Detection System / Ala Eltahir Abdalla Mohamed ; Ahmed Abdalla Mohammed .- Khartoum: Sudan University of Science and Technology, college of Engineering, 2019 .- 86p. :ill. ;28cm .- M.Sc. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/23631
dc.description Thesis en_US
dc.description.abstract Security became an important issue in networks world. Intrusion Detection Systems (IDSs) are one of the most tested and reliable technologies to monitor and detect attacks. Network Intrusion Detection Systems (NIDSs) collects network traffic information from some point on the network or computer system and then use this information to secure the network. There are two methods basis on the source of data to be analyzed in NIDSs; Packet-Based and Flow-Based. This research implements both methods to detect scanning and flooding attacks. Packet-Based NIDS is done using the misuse-based IDS Snort. Snort is an open-source project. Configured to run in NIDS mode. Attacks are launched from remote host that uses Kali tool. For Flow-Based NIDS, an algorithm is implemented with C language to detect and identify network attack based on Time-based Aggregation Traffic (TAT) feature that extracted from previous exported NetFlow record to detect several scan and Denial of Service (DoS) attacks. After implementing and testing both methods, results showed that Packet-Based can detect scanning attacks and flooding attacks very well and able to made an alert for that but Snort cannot alert every incoming packet because of the inability of Snort to analyze multiples packet in small time. For Flow-Based NIDS detect all scanning and flooding attacks correctly with False Positive almost zeroactually is 0.002 and with True Positive equal 1. Hybrid system for both inspections method is recommended to get the best feature of the both Network Intrusion Detection Systems. en_US
dc.description.sponsorship Sudan University of Science and Technology en_US
dc.language.iso other en_US
dc.publisher Sudan University of Science and Technology en_US
dc.subject Electronics Engineering en_US
dc.subject Computers and Networks en_US
dc.subject Packet-Based en_US
dc.subject Network en_US
dc.title Implementation of Packet-Based and Flow-Based Network Intrusion Detection System en_US
dc.title.alternative تنفيذ نظام لاكتشاف التسلل في الشبكات علي مستوى الحزمة وعلي مستوى التدفق en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account