Framework for Examining Intrusion Detection in Wireless Network

Show simple item record

dc.creator Marete, John M.
dc.date 2014-01-28T10:35:58Z
dc.date 2014-01-28T10:35:58Z
dc.date 2014-01-28
dc.date.accessioned 2017-03-19T20:42:59Z
dc.date.available 2017-03-19T20:42:59Z
dc.identifier http://ezproxy.kca.ac.ke:8010/xmlui/handle/123456789/90
dc.identifier.uri http://41.89.49.13:8080/xmlui/handle/123456789/712
dc.description A Research Project Submitted In Partial Fulfillment of the Requirements For The Award Of Master Of Science In Data Communication At KCA University
dc.description In today’s technology many institutions and business communities have embrace computer network connections to facilitate communication and sharing of available resources as means of exchanging electronic information locally and externally with other network. Wireless devices in a network are used to detect any intrusion and director types used for checking effect of attack (Carl, 2004). Network security devices/software like snort, firewall etc. are installed as the first step of securing networks after the implementation of any network. Snort IDS is a security tool and an intrusion detection system, capable of performing network real-time data traffic analysis and also data packet logs on IP networks (Caruso, 2007). Snort IDS software uses defined rules and policies to check each packet reaching to its network interface card in any connection. Despite the usage of this software in security the network there are a lot of intrusion and attack into private networks even with the implementation security tools. Organizations, institutions and other network implementers therefore are not certain that their networks are truly protected due to external attacks and intrusions subject to them. Implementation of firewall and snort software will help to monitor, detect, observe and examine and report any intrusion and attack to the network either known or unknown attacks. To achieve this, a framework implementation of Wireless Network in Intrusion Detection system (WIDS) within network perimeter to examine SNORT operation in detecting any attack and intrusion is used. The technology which can be implemented here is WIDS used for detecting inappropriate, incorrect, or anomalies activity on a network. WIDS are suitable for any types of organization for protecting the networks and associated devices systems. The main objective for this research writing is to examine snort operations using intrusion detection systems (IDS). Judy (2002), IDS identifies any attacks and protects the system against attack, threats, misuse and Denial of Service in computer network. The framework developed will examine the IDS software operations to monitor any anomalies within the network. To achieve this objective, IDS will be implemented on a network to examine its operations to determine their shortcomings in protecting the network.
dc.language en
dc.relation November 2013;KCA/11/02984
dc.title Framework for Examining Intrusion Detection in Wireless Network
dc.type Thesis


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account