• Firstly, appraise the network security critically in the perspective of a NIDS.
  • Theoretically analyse the two types of IDS which are the signature-based and the anomaly-based.
  • Evaluate the presence of tools that can be availed for creating the testbed that is based on evaluation
  • The last objective is to set up the testbed of evaluation based on the outcomes generated from the previous investigations.
Intrusion Detection