{"title":"Innovative framework design of an intelligent detection and monitoring system (IDMS) to leverage National Security","authors":"Okonta O. Emmanuel, Ajani Dele, Okonta I. Love","doi":"10.47587/sa.2023.4302","DOIUrl":null,"url":null,"abstract":"Intrusion monitoring is the act of monitoring unwanted traffic on a network or a device, analysing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion detection is the process of detecting a possible compromise or events occurring in a computer system or network. An IDMS can be a piece of installed software or a physical intelligent appliance that monitors network traffic in order to detect and prevent unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. This innovative design primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, try to inoculate the system to prevent similar attacks using recognisable signature patterns and this will enhance National Security and prevent unwarranted cyber-attacks on organizations and important National resources","PeriodicalId":273863,"journal":{"name":"Science Archives","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science Archives","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47587/sa.2023.4302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Intrusion monitoring is the act of monitoring unwanted traffic on a network or a device, analysing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion detection is the process of detecting a possible compromise or events occurring in a computer system or network. An IDMS can be a piece of installed software or a physical intelligent appliance that monitors network traffic in order to detect and prevent unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. This innovative design primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, try to inoculate the system to prevent similar attacks using recognisable signature patterns and this will enhance National Security and prevent unwarranted cyber-attacks on organizations and important National resources