logo

CMIT 320 - Study Of Security Issues In Network | Survey Of Technovy

   

Added on  2020-02-24

9 Pages2684 Words30 Views
Chapter 3Methodology3.1 IntroductionThis study aims at reviewing the security issues in network through a method known as survey1.A survey was conducted for Technovy information technology companies whose intention wasfor studying some of the challenges to intrusion, may it be threats, attackers with a bad motive oreven the malicious softwares for detection security in information system networks. The surveywas conducted using a questionnaire method. This research explores the applicability of data or information extracted techniques for detectingintruders or attackers in all ways2. For investigation to be a success in this area an experimentmethod was performed. Various experimentations using softwares that are machine controlledwere performed in determining the efficiency of methods used for detecting intruders3. Thischapter will discuss in details the system development methodology, the feasibility study, factsfindings methods, data and system analysis methods and system specifications to be used indeveloping the honeypot system4.3.2 Statement of the ProblemOne of the necessity of all IT companies is the security of the computer network with how itexpands. In security, factors which are critical in networks is detecting the intruders or attackerson security of the computers. Detecting intruders has become a very challenging issue to dealwith as the connectivity increments in information systems and the services that they incorporate.In this perspective “What are some of the encounters in detecting intruders attacking the securityin computer networks? Researcher pursues in studying the security issues in networks,specifying the need of systems meant for detecting intruders and the challenges this systemundergoes in ensuring the security in computer networks in information Technology units ofTechnovy region.1Applied social sciences research methods series, explained on fowler article , on page 542 Classics in applied mathematics design and analysis of Experiments article by Peter. John, on page 223 Experimental Design Procedures for the Behavioural Sciences highlighted in his journal article, on page 27-304 Research methods Knowledge Base by Trochim in Cornell university websites1

This investigation is intended to determine the data mined techniques that assists instrengthening the network security5. Major idea to be kept in mind is to know if that the mineddata can be used as a mechanism in detecting attackers and intruders with negative motives. Theexecution of various experiments need to be executed. The experiments aim at finding out themethods used in solving security issues in computer networks in an efficient manner. The majoridea of this study is providing a framework that has the capability in giving solutions forchallenges to intruders detected. The research Proposes to getting solutions for the followingstudy questions that arose while doing the investigations.1.What are the challenges facing current systems for intruder’s detection?2.What are the techniques which are effective in data mined for intruder’s detection?3.Reason to why security in computer networks is very vital?4.How to differentiate if the network traffic coming in is normal or intruded?5.The role played by detecting intruders in computer network security?3.3 Research MethodologySystem development methodology refers to the framework that is used to structure, plan, andcontrol the process of developing an information system Linda Night, Theresa Steinbach and6. Awide variety of such frameworks have evolved over the years, each with its own recognizedstrengths and weaknesses. One system development methodology is not necessarily suitable foruse by all projects. Each of the available methodologies is best suited to specific kinds ofprojects, based on various technical, organizational, project and team considerations. This research will use survey, method in identifying the issues in network security and employthe method of experimentation in constructing the framework7. This makes the study to relatewith NSM (network security mngt) which is a study with specific references to informationtechnology industrial units in Technovy region. In the study both the secondary and primary datais gathered to determine the role of network security and the systems for detecting intruders.Data that is primary is gathered through method known as survey where the secondary data isgathered through unpublished material and unpublished material. The research methodology be5 Design, innovation and discovery article name statistics for experiments by George Box highlighted from page 116 System Development Methodologies for Web Enabled E-Business website source by Kellen Vince 7 Survey Sampling on Wiley Inter Science article highlighted by Kish on page 47-562

applied in this context elaborates on how to obtain the whole sample and randomly choosing asample size for the survey and experimentation8.To develop the system, Rapid Application Development (RAD) which is one of these systemdevelopment frameworks will be used.3.3.1Rapid Application DevelopmentRapid Application Development (RAD) is an incremental software process model thatemphasizes a short system development cycle. It compresses the step-by-step development ofconventional methods into an iterative process9. The RAD approach thus includes developingand refining the data models, process models, and prototype in parallel using an iterative process.User requirements are refined, a solution is designed, the solution is prototyped, the prototype isreviewed, user input is provided, and the process begins again. RAD is therefore flexible andadaptable to changes thus making it easier to change requirements.RAD consists of various phases during software development process. These phase are discussedin details below.1.Requirement planning phaseThis phase will provide a thoroughanalysis of the information systemsecurity including the attack, thethreats, and malwares and how thehoneypot system will ensure that the8 Research Methodology, Methods and techniques on article by Kothari pages 45-789 A decision-making framework for management article by Cavalieri pages p. 379-396.3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Artificial Intelligence-Based Intrusion Detection System
|12
|2988
|162

Malicious Software Protection Policy
|6
|1728
|181

Cyber Security - Assignment PDF
|8
|2242
|71

Data Analytics for Network Intrusion Detection
|15
|1674
|452

Methodology of Fraud and Theft Detection using Data Mining
|13
|3105
|190

MIT141559 IT Security Assignment: Networking Intrusion Detection Systems
|6
|1185
|131