Intrusion Detection and Prevention System Using Gufax Micro Finance Bank Plc, Ikot Ekpene as a Case Study
Chapter One
Aim and Objectives of Study
The aim of this project is to develop an Intrusion Detection and Prevention System with the following objectives:
- To design a system that will encrypt information pertaining to customers to prevent intrusion.
- To develop a system that will require an encryption key before bank transaction information can be viewed.
- To implement a system that will prevent disclosure of customersโ data to fraudsters by utilizing cipher text.
CHAPTER TWO
LITERATURE REVIEW
Introduction
This chapter focuses on the theoretical background, the literature review, the contributions of other researchers is examined in this chapter.
Theoretical Background
In developing an intrusion, detection and prevention system, the technologies used were visual basic 6.0 and relational database technology. Visual Basis 6.0 is a high level programming language which evolved from the earlier DOS version called Basic: Basic means beginners all purpose symbolic instruction code it is a relatively easy programming language to use in developing an information system. ย The visual basic programming language in this research act as the front end engine while the relational database will act as the back end engine. ย The relational database use in this research is Microsoft access 2007 version. ย It has file extension as accdb.
CHAPTER THREE
DESIGN AND ANALYSIS
Introduction
This chapter focused on the research methodology the methodology used in the development of the proposed system is the spiral model methodology, system analysis and design being used, the system analysis which include system design, system architecture, input layout, output format, analysis of the existing system, problem of the existing system, analysis of the proposed system, advantages of the proposed system and disadvantages of the proposed system.
Advertisements
Research Methodology
The methodology employed for the development of the system is the spiral model. A software development methodology or system development methodology is a frame work that is used to structure, plan and control the process of developing an information system. The spiral development model comprises the elements of both design and prototyping. The model has four stages namely: Planning, Analysis, Evaluation and Development. Also, the data used for the development of the research was gotten from the internet, textbooks and articles. The contributions of other experts on the subject were examined so as to gather relevant information. The case study also provided useful information for the development of the system.
CHAPTER FOUR
SYSTEM IMPLEMENTATION AND DUMENTATION
Introduction
This chapter presents the choice of programming language, programming environment and system implementation.
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
Introduction
This chapter presents the summary, conclusion and offers useful recommendations.
Constraints of The Study
In carrying out the research work, some challenges were faced that limited the study such as:
Time:ย The time given for the completion of the research work was too short hence the researcher had speed up the research work to meet up and this has an impact on the study.
Limited Materials: few materials were found pertaining to the research area and this limited the bulk of the literature review.
Finance: The high cost of textbooks, internet browsing and transportation to different libraries to gather materials stood as a constraint to the research work.
Summary
This research project was carried out in an attempt to develop intrusion, detection, prevention and drawback system using first bank plc, Ikot Ekpeneย as the case study this project is an application that will enhance Productivity, effectiveness and efficiency by reducing work intensity, less tedious, enhance speed optimization and reduced queuing in the bank. It will help the management and staff to keep track of intrusion process properly, enables management to keep track of the total numbers of aspirant and the total numbers of voters. It also enables the management to know the customers who try to intrude.ย The challenges of the existing system were; poor performance experienced during withdrawing process, the current system makes it hard to serve customers and staff effectively. This is seen when customers queue for not less than 20 minutes to deposit or withdraw hence wasting a lot of time.ย The challenges of the existing system can be solve when the proposed system is adopted. The researcher gathers data through primary and secondary sources which includes textbook, journals and the internets. This software is developed using visual basic 6.0 programming language. The new system has more advantages over the manual system in terms of speed, efficiency, accuracy, storage and easy retriever of information for decision making.
Conclusion
Conclusively, this research work has successfully accomplished intrusion, detection, prevention and drawback system that has replaced the manual/existing mode of automated machine process in the first bank.
Recommendations
Below are the recommendations of this research work
- More compatible Automated Teller Machine (ATM) should be procured to run this application.
- Customers should be taught on how to operate it effectively.
- The ATM should be maintained by expert at regular intervals.
The systems should be secured with password to prevent intrusion.
REFERENCES
- Aranya, J.; Padmavathi, G. (2015). “A Brief Study on Different Intrusions ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย ย andMachine Learning-based Anomaly Detection Methods in Wireless Sensor Networks”
- Anderson, Ross (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & Sons. pp.ย 387
- Bezroukov, Nikolai (11 December 2008). “Architectural Issues of Intrusion Detection Infrastructure in Large Enterprises
- Hohn R. Vacca (2010). Managing Information Security.
- Hansen, James V.; Benjamin Lowry, Paul; Meservy, Rayman; McDonald, Dan (2007). “Genetic programming for prevention of cyberterrorism thn.
- ย Michael E. Whitman; Herbert J. Mattord (2009). Principles of Information Security.
- Robert C. Newman (19 February 2009). Computer Security: ย ย ย ย ย ย ย ย ย ProtectingDigital Resource
- Tim Boyles (2010). CCNA Security Study Guide: Exam 640-553. John Wiley and Sons. p.ย 249