Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
油
This document describes a project on intrusion detection and prevention systems in an enterprise network. It was submitted by Okehie Collins Obinna to the Department of Computer Science at the Federal University of Technology in partial fulfillment of a Bachelor of Technology degree in Computer Science. The project analyzes intrusion detection and prevention technologies used in enterprise networks and designs a desktop application to monitor a computer network system for possible intrusions and provide an interface for a network administrator.
Wired Equivalent Privacy (WEP) was an early protocol for wireless network security. It aimed to provide confidentiality through encryption and integrity through a checksum. However, WEP had several flaws:
1. It reused encryption keys too frequently due to a small initialization vector space, allowing the same encryption to be used for multiple packets.
2. It used a weak integrity checksum that could be predicted, allowing packets to be modified without detection.
3. Its short secret key provided insufficient security against brute force attacks to recover keys from captured network traffic.
This document discusses security challenges in wireless sensor networks. It covers several topics: why security is needed in WSNs given their mission-critical applications; why security is more complicated in WSNs due to resource constraints of sensor nodes; common security requirements like confidentiality, integrity, and availability; guiding principles for securing WSNs like decentralized management and adaptive security; common attacks against WSNs at different layers of the protocol stack; and open research issues regarding cryptography, key management, secure data aggregation, and other high-level security mechanisms for WSNs.