Research Proposal Report on Intrusion Detection System

Student’s Name:
ID Number:
Attendance Number:
Section:
Date of Submission:

Statement of the research problem
Intrusion Detection is a system that involves developing security through the management regarding the various activities and tasks that are performed within its system. The main aim of the intrusion detection system is to identify the problems and breaches that occur in the system across the entire network established in the organization. Developing a sustainable intrusion detection system is the major concern of the management and security related organizations in the world. It involves developing a considerable amount of research among the factors that are significant in contributing or affecting the efficiency of operations that are witnessed in the organization. For this purpose, it can be stated that the intrusion detection play a vital role in the development of security within the organization. Also, there are many factors involved in the maintenance of integrity and confidentiality in the organization.
With the advancement in technology and other significant inventions in the information Technology field, there are many devices and systems developed for tracking the performance of the employees in the organization as well as obtain the effect of the external factors on the performance of the employees. On a similar note, the main problem that exists is the assignment of the certification of confidential data by the government. It has helped in ensuring complete success across the different operations performed in the organization. At the same time, reestablishing the lost data and other information in an organization if handled manually is possible. But, the retrieving of data has to be carried out when the detection system identifies the individual and it correlates their identity with the network that is established in the intrusion detection system across the entire system and is also observed in the different dimensions that are related to the development of an economy.
The complete digitalization of the resources and information in the current scenario observed in the companies requires a considerable amount of security to protect it from getting misused or get accessed by unauthorized persons. The intrusion that is the interference in the system through violation of the network can either be by any external element for a specific purpose or it can be from an internal element that interferes in the system where he is not supposed to enter or access (US Patent No. US 6405318 B1, 2002). The incidents of unauthorized personnel handling the data has to be kept under control so as to safeguard the information through the intrusion detection system in the IT management firms.
Literature review
There are many functions that are played by an intrusion detection system. It involves certain challenges that are to be handled effectively and are to be developed accordingly for the benefit of the system. It includes considering the computational power of the Intrusion Detection system. It possesses a comprehensive view that has to be handled accordingly to ensure high levels of security and integrity in the organization. The functions that are to be performed in the organization has a pivotal role in the development of the IDS for the system across the entire network (Liao, Lin, Lin, & Tung, 2013). The main functions that are to be handled in the system involve handling of data as well as information of the organization require to be secured and safeguarded from internal as well as external elements. There are many consequences that the organization would have to face if it does not ensure proper and strict adherence to the framework developed in the organization.
Algorithm is very useful in developing the codes and other structure that is required to be developed for an Intrusion Detection System. It helps in assigning proper value to the progression that is used in the system to obtain any kind of flaws that may be present in the working as well as other conditions of the system. Generic Algorithm has the required stability and characteristics that is required for developing a successful IDS across the network. The confidential and highly technical data that is present in the organization tends to be the key factors that are responsible for the success of a business or organization in the IT field management industry (Hoque, Mukit, Bikas, & Naser, 2012).
There is a formation of patterns in the network that is present in the system. It includes several patterns to be considered and handled accordingly for the identification of the patterns that pose a threat to the security and integrity of the organization. Few researchers have developed the “Real-time Payload-based Intrusion Detection System” that would integrate the intrusion system with the network through the use of the web. The efficiency of the method to establish security across the entire system has been identified (Jamdagni, Tan, He, Nanda, & Liu, 2013). These patterns that are developed are to be studied extensively in order to obtain the different between the positive patterns that are developed daily and the negative pattern that occur rarely and develop doubts in the minds of the security personnel.
There is a huge scope of developing the intrusion detection system for the wireless applications to identify the threats that are posed across the system in a network. The security attacks can be from any dimension and hence it is very important to provide the initial knowledge to each and every one in the organization. This would be carried out by providing specialized skills training and teach the employees belonging to different fields regarding the importance of a systematic approach for identifying the threats that exist in the processes that are carried in the field of medical sciences. There are many complications involved in the organizations that are involved in critical handling of data of people and it has to be made sure that in such situations, the IDS is developed and tested to obtain high efficiency and effectiveness across the system (Alrajeh, Khan, & Shams, 2013).
Goals of the research
The research involves developing the factors that are responsible for the maintaining of security and integrity in an organization across the entire network and system that is used by the employees. The goals of the research have been identified after evaluating the systems that are prevailing in the organization and develop the required analysis for the intrusion detection system. Establishment of an Intrusion detection system in an organization need to develop certain objectives and goals for identifying the elements that are a part of the system and help in maintaining the confidentiality, security and integrity across the system.
The goals of the research are as follows:
• To obtain the accessibility of the data has to be identified and evaluated accordingly,
• To derive the confidentiality of various processes and structure that are observed in the organization,
• To obtain the “Network Intrusion Detection Systems (NIDS)” that are used to monitor traffic from all the devices that are present in the network.
• To obtain the “Host Intrusion Detection Systems (HIDS)” that are used to monitor traffic from a single device at a time in the entire network.
• To obtain the “Network Node Intrusion Detection Systems (HIDS)” that are used to identify the traffic that goes from one network to a particular host that is handling the information in the system.
• To monitor the flow of information to and fro across the system where the network is used to maintain the flow across the different activities that are performed in the organization.
• Developing and identifying the different configurations that are present in the system and also obtain the vulnerabilities that are existing in the entire system.
• Evaluating security of the files that are received and sent through the system using the same network
• Identify the potential form of attacks from external factors on the system through the network that is available to them.
• Identify the various factors that are involved in developing internal factors prevailing in the network that is available for the system.
• Developing the ability to identify any form of irregular patterns or activities through the system,
• Obtain proper knowledge of the user policies and norms that are developed by an organization throughout the system.
• Any sort of violations of the above considered user policies and norms has to be reported and action has to be taken at the same time.

Research Methodology
Methods used in research process
Quantitative Research
Quantitative Research constitutes of the research that involves measurement or involves numerical analysis involving collection of statistical data and its analysis. It involves studying of the numerical data and evaluating it to describe the topic. (Newman, 1998)
Qualitative Research
Qualitative Research constitutes of developing a research based on quality or characteristics of a specific topic and developing a collection of the responses and information for evaluation and obtaining a conclusion on the basis of the hypothesis analysed. It also includes Attitude research which involves collection of various opinions from different people which helps to develop a hypothesis on human behaviour. (Newman, 1998)
Research questions
1. What is the impact of Intrusion Detection system on the security and integrity of an organization?
2. How can the intrusion detection system be enhanced to increase the level of security existing in an organization?

Data collection
Data collection plays a significant role in the development of the research. It can be done through the following ways:
• Interview
• Focus group
• History analysis
• Participant Observation
• Non Participant Direct Observation
• Mass Observation
• Case study
• Survey
• Mail questionnaire
• Pilot study
• Life history
• Patent study
• Telephonic survey (Kothari, 2004)
For researching the IDS in an organization, a survey would be the best data collection tool that would help in developing genuine feedback from the people that are working in the organization. For collecting the data, random sampling of people would be done and they would be working in the same organization where IDS has to be evaluated. It would provide a first-hand information about the structure and system that has been adopted in the organization for safeguarding it from any kind of intrusion and detecting as well as rectifying it from affecting the organization.
Planned Analysis
Primary analysis
It is the analysis prepared first hand by the researcher owing to his understanding, evaluation and data collected and the hypothesis developed by him on the basis of known statistics. It is the most fresh information and data that is collected on a specific topic and serves as a base for secondary analysis. There are limited sources for referring and obtaining the data. (Glass, 1976)
Secondary analysis
It is an analysis that is performed after the primary analysis by considering the conclusion and the results of the first analysis as a reference. It may be carried by the same individual who has performed primary analysis or by another individual with the objective to improve or update the earlier analysis with more effective statistical methods. (Glass, 1976)
Research schedule and deliverables
The research schedule that has to be followed across the entire process of research has been shown in the following table:
Task Purpose Estimated time
Identifying the system configurations and understanding it. Help in getting a proper understanding and knowledge of the system Week 1: 2 days
Evaluating the important tasks that re to be secured To identify the important tasks that require security and need to be protected from external as well as internal intrusion. Week 1: 3 days.
Analyzing the intrusion detection system and testing it Obtain the structure and functioning of the IDS Week 2: 3 days
Developing scope for improvement in the IDS Identify the sections that require considerable amount of improvements Week 2: 2 days
Deriving solution for improving the IDS It will help in increasing the current level of security observed in the organization Week 3: 3 days
Implementing the solution and testing it on small scale Help in obtaining the feasibility of the solution Week 3: 2 days
Week 4: 2 days
Rectifying the solution and implementing it on large scale Appropriate IDS would be obtained across the system Week 3: 3 days

Budget narrative
It has been provided in a separate excel sheet.
References
Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: a review. International Journal of Distributed Sensor Networks, .
Glass, G. V. (1976, november). Primary, Secondary, and Meta-Analysis of Research. Educational Researcher, 5, 3-8. Retrieved july 22, 2014, from http://www.jstor.org/discover/10.2307/1174772?uid=3738256&uid=2&uid=4&sid=21104370889707
Hoque, M. S., Mukit, M., Bikas, M., & Naser, A. (2012). An implementation of intrusion detection system using genetic algorithm. arXiv preprint.
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). Repids: A multi tier real-time payload-based intrusion detection system. . Computer Networks, 57(3), , 811-824.
Kothari, C. R. (2004). Research Methodology: Methods and Techniques. New Age International. Retrieved july 22, 2014, from http://books.google.co.in/books?hl=en&lr=&id=8c6gkbKi-F4C&oi=fnd&pg=PR7&dq=research+methodology+and+its+types&ots=iHfEmRM4rO&sig=IMWMFpwpLWTifWm_ipf_dVdpOXY#v=onepage&q=research%20methodology%20and%20its%20types&f=false
Liao, H.-J., Lin, C.-H. R., Lin, Y.-C., & Tung, K.-Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36, no. 1, 16-24.
Newman, I. (1998). Qualitative-quantitative Research Methodology: Exploring the Interactive Continuum. SIU Press. Retrieved july 22, 2014, from http://books.google.co.in/books?hl=en&lr=&id=xumf1ABFz8cC&oi=fnd&pg=PR9&dq=research+methodology+and+its+types&ots=NEZAAWBHZO&sig=TivmVKTy0pby3fd9CZXpwrtRTBQ#v=onepage&q=research%20methodology%20and%20its%20types&f=false
Rowland, C. H. (2002). US Patent No. US 6405318 B1.

Skills

Posted on

March 9, 2018

Submit a Comment

Your email address will not be published.