EKETE - INTERNATIONAL JOURNAL OF ADVANCED RESEARCH
Home > Vol 3, No 2 (2025) > Mbah

A WEB-BASED INTRUSION DETECTION SYSTEM FOR SOCIAL MEDIA FORUMS WITH INTRUDER IDENTIFICATION AND ACTIVITY LOGGING

Blessing Chinasa Mbah, Steven C Ikporo, Gift Adene, Christopher Toochukwu Mbah

Abstract


Intrusion Detection Systems (IDSs) is described as the ability of a system to recognizing malicious activities against computing resources and in turn protect against threats. The internet today is a great means of communication between users which ranges from social media to e-mails but hackers intruding to various users account have cause a lot of problems which ranges from inability of social media users to know those that attempt to login to their account, in ability of internet users to know the time, date of the particular user that tries to access or intrude to their account and also in ability to track and detect intruders details. These therefore led to the development of web based intrusion detection and notification system for social network which will capture the date, time of the intruder or attacker and also block the intruders from gaining access to the system, easy retrieval of records of logs for quick decision making it also has detection and finally a central database for managing all records of attackers within a particular time. The methodology adopted to carry out this project work is Object Oriented Analysis and Design Methodology, this methodology is adopted because it is easy to understand and maintain, it provides re-usability, it reduces the development time and cost, and it improves the quality of the system due to program reuse.. This project work was developed using hypertext pre-processor (PHP5), JQUERY, and HTML5 scripting language and also cascading style sheet (CSS3) for the interface design, APACHE was used as the web server and MYSQLi for the database. After implementation this project the result showed that the research work was able to capture the intrusion attempt date and time and as well blocked the intruder from gaining access to the system.


Keywords


Intrusion Detection; Cyber Security; Social Media; Web Application; Software Engineering

Full Text:

PDF

References


Adene Gift, Adannaya Simeon Ivo, Ugboaja Uchenna Chikwendu, Eziechina Malachy Amaechi, "Social Media, A Tool For Increased Visibility For Engineering Firms: Risks And Benefits," International Journal of Computer Trends and Technology, vol. 69, no. 6, pp. 61-65, 2021. Crossref, https://doi.org/10.14445/22312803/IJCTT-V69I6P110

Asaka, K. (1999). An intrusion detection architecture (IDA) based on hierarchical architecture using mobile agents.

Hudson M., What is social media?. Retrieved from https://www.thebalancesmb.com/what-is-social-media-2890301., (2020)

Industrial Research Institute Release (2015). Analysis Report on the Development Prospect and Investment Strategic Planning of China’s Big Data Industry from 2015 to 2020. http://blog.sina.com.cn/s/blog_c4a726e70102wkvp.html

Johnson, A., & Lee, M. (2021). The evolution of intrusion detection systems in internet-based technologies. Journal of Network Security, 34(2), 45-60.

Morris, R. (2021). The role of intrusion detection systems in modern internet security. Cybersecurity Journal, 15(4), 212-225.

Musial, K., & Kazienko, P. (2016). Categorizing social networks on the internet: A comprehensive overview of online platforms.

Sebastian, R., Roschke, K., & Cheng, H. (2014). Deployment of intrusion detection system sensors on separate cloud layers for efficient event gathering and detection.

Smith, J. (2020). Vulnerabilities in business networks: A growing security concern. International Journal of Cybersecurity, 29(1), 88-97.

Stolfo, S., & Lee, W. (2015). Intelligent distributed Java agents and data mining for learning models of fraud and intrusive behaviors.

Timm, T. (2016). Evolving hacker tactics and their impact on social media network platforms and the virtual community.

Wang, Y., Gihan, V., Karl, N., & David, W. (2006). A network security monitor. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy (pp. 296–304). Oakland, CA: IEEE Computer Society Press.

Wang, Y., Gihan, V., Karl, N., & David, W. (2006). An automatic tool for generating mobile agents for distributed intrusion detection systems (IDS).

Williams, B. (2021). Malicious attacks and defense mechanisms in network systems. Computer Security and Networks Review, 25(3), 158-174.

Williams, B., & Johnson, A. (2021). The evolution and advancements of intrusion detection systems. Journal of Network Security, 39(1), 112-125.


Refbacks

  • There are currently no refbacks.


EKETE - INTERNATIONAL JOURNAL OF ADVANCED RESEARCH.   Powered by Journalsplace.org