Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11643
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Adam, Muhammad Saliu | - |
dc.contributor.author | Mohammed, Bashir Abdullahi | - |
dc.contributor.author | Mohammed, Idris Kolo | - |
dc.contributor.author | Abdullahi, Rukayyah Ozigi | - |
dc.date.accessioned | 2021-07-26T12:07:51Z | - |
dc.date.available | 2021-07-26T12:07:51Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11643 | - |
dc.description.abstract | The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from taking place or getting into the internal network. However the attackers seldom get their way into the internal protected network, by bypassing the security systems offirewalls and other access control measures. These security measures do not know what happens inside once they are bypassed. There is, therefore needforanothersystem that - will help detect these threats and possibly remove them. This system, which this paper seeks to explore, is called Intrusion Detection System. This will make the network and its resources more secured. | en_US |
dc.description.sponsorship | Self | en_US |
dc.language.iso | en | en_US |
dc.publisher | Journal of Information and Knowledge management | en_US |
dc.subject | Intrusion | en_US |
dc.subject | network security | en_US |
dc.subject | Firewall Security | en_US |
dc.subject | Detection | en_US |
dc.subject | Access control | en_US |
dc.title | INTRUSION DETECTION SYSTEMS: COMPLEMENT TO FIREWALL SECURITY SYSTEM | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Intrusion Detection.pdf | Intrusion Detection System | 285.7 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.