Home-Based Intrusion Detection System

Authors

  • Mohd Nizam Omar InterNetworks Laboratory, School of Computing, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah, Malaysia.
  • Guled Yusuf Mihile Guled InterNetworks Laboratory, School of Computing, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah, Malaysia.
  • Haryani Zakaria InterNetworks Laboratory, School of Computing, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah, Malaysia.
  • Angela Ampawan InterNetworks Laboratory, School of Computing, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah, Malaysia.
  • Roshidi Din InterNetworks Laboratory, School of Computing, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah, Malaysia.

Keywords:

Intrusion Detection System (IDS), HomeBased IDS, Hacking, Intrusion,

Abstract

Wireless network security has an important role in our daily lives. It has received significant attention, although wireless communication is facing different security threats. Some security efforts have been applied to overcome wireless attacks. Unfortunately, complete attack prevention is not accurately achievable. Intrusion Detection System (IDS) is an additional field of computer security. It is concerned with software that can distinguish between legitimate users and malicious users of a computer system and make a controlled response when an attack is detected. The project proposed to develop IDS technology on the windows platform. The IDS adopted misuse detection, which is based on signature recognition. The main objective of this proposal is to detect any network vulnerabilities and threats that concern home-based attacks or intrusion. There are five steps in our methodology: The first step is to create awareness of the problem by understanding the purpose and scope of the learning, as well as the problem, which are necessary to be solved. The second step is to make suggestion that the intrusion detection system is protecting the network of the homes. The third step is to develop signature by establishing a set of rule thorough processes for testing IDS. The fourth step is evaluating and testing the system that has been developed. This design used the sensor to find and match activity signatures found in the checked environment to the known signatures in the signature database. Finally, the conclusion in this phase showed the results of the study and the achievement of the objectives of the study. This IDS project will contribute to the efforts to protect users from the internal and external intruders.

Downloads

Published

2017-06-01

How to Cite

Omar, M. N., Mihile Guled, G. Y., Zakaria, H., Ampawan, A., & Din, R. (2017). Home-Based Intrusion Detection System. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-4), 107–111. Retrieved from https://jtec.utem.edu.my/jtec/article/view/2370

Most read articles by the same author(s)