Search
Close this search box.

Authors: Aderonke J. Ikuomola, Adesina S. Sodiya, Joshua O. Nehinbe

Abstract
In recent years, the security issues on computer networks have become one of the primary

concerns because the pervasiveness of computer technology has rendered computer networks to be more vulnerable to attacks than ever before. It is necessary to take corrective actions in the process of detecting surreptitious attacks to ensure proper safety of the entire system.
However, effective post-intrusive actions depend on integrated efforts of experts and systems and a thorough understanding of intrusion detection processes. Therefore, this work aims to strike a balance between damages made by the intrusion and cost of response. Cost-Sensitive modeling approach will be used so as to define the cost factors involved. The prototype of the design is briefly discussed.

 

 

Download PDF

Times Higher Education (THE)
World University Rankings (WUR) for 2024

rANKING OF UniversitIES of Agriculture

1ST IN aFRICA | 7TH gLOBALLY

30th Convocation Ceremonies

Award of First Degree to deserving graduands

Days
Hours
Minutes
Seconds