DEVELOPMENT OF INTRUSION DETECTION SYSTEM FOR
ERISCO FOOD LIMITED OKIGWE, IMO STATE
Submitted by
NWANKWERE EBUKA DAVID
2016/102418/REGULAR
CHRISTIAN IFENDU OBASI
2016/21532/IAS
BEING A PROJECT REPORT SUBMITTED TO THE
DEPARTMENT OF COMPUTER ENGINEERING,
FACULTY OF ENGINEERING.
ABIA STATE UNIVERSITY.
IN PARTIAL FULLFILLMENT OF THE REQUIREMENT FOR
THE AWARD OF B.Eng. IN COMPUTER ENGINEERING.
ENGR.DR. DURUOHA
OCTOBER, 2022
CERTIFICATION
This is to certify that this project research work was carried out by Nwankwere Ebuka David
with the matriculation number of 2016/102418/Regular and Christian Ifendu Obasi with the
matriculation number 2016/21532/IAS of the Department of Computer Engineering, Faculty of
Engineering, Abia State University, Uturu.
..……………………..
NAME OF STUDENT DATE…………………………
………………………...
NAME OF STUDENT DATE………………………….
APPROVAL
This is to certify that Nwankwere Ebuka David , Christian Ifendu Obasi with matriculation
number 2016/102418/Regular and 2016/21532/IAS students of Computer Engineering, has
satisfactorily completed the requirement for this project for this project is original and has not to
our knowledge been published or submitted in part or full for any degree of this university.
…………………………… ……………… …………
NAME OF SUPERVISOR SIGNATURE DATE
…………………………… ……………… …………
NAME OF HEAD OF SIGNATURE DATE
DEPARTMENT
…………………………… ……………… …………
NAME OF EXTERNAL SIGNATURE DATE
EXAMINER
…………………………… ……………… …………
NAME OF DEAN, SIGNATURE DATE
FACULTY OF ENGINEERING
DEDICATION
I dedicate this project work to God almighty for his protection, strength, provision and guidance
throughout the research of this work.
In a special way, I also like to dedicate this work to the enhancement of technology in the
facilitation of Mans activities.
ACKNOWLEDGEMENT
I sincerely would like to first express my gratitude to God Almighty and to my parents for the
unending love, attention and support.
Secondly to the Faculty, Department, lecturers and staff of Computer Engineering and also to the
Internet at large and to everyone who has contributed to the success of this project.
And lastly to my supervisor, ENGR. DURUOHA, I say thank you: for his directives, advice,
supervision and patience which catalyzed and facilitated this work. Thank you sir.
ABSTRACT
As the world is developing the need for electronics in human endeavor is now taking a larger
scope. With the invention of certain electronics gadgets in our societies today, certain activities
become easily handled for example; in communication where the telephone plays a part. In
places where safety are needed an alarm system will be of much important.
The application of electronics in this modern age is simply inexhaustible and this group form
more interest in the alarm system after negotiating the increase in the case of burglaries in
homes, cars, etc. The selection of a proper alarm is not a simple matter because the need of each
individual home owners or businessman is different like a set of finger prints.
Some factors and question which must be answered when selecting an alarm system include:-
a. What system need be protected?
b. What type of sensor are needed?
c. The method of transmission needed for the alarm signal
The purpose of producing the intruder alarm system is to limit this effect of the criminology in
the society by informing us that our properties are in danger. All these will bring alarm the way
by which criminal break into private properties by searing them away once the alarm is trigged.
TABLE OF CONTENT
Cover page i
Certification page ii
Approval page iii
Dedication iv
Acknowledgement v
Abstract vi
Table of contents vii
CHAPTER ONE-INTRODUCTION
1.1 Background of study 1
1.2 Statement of the problem 1
1.3 Aims and objectives 1
1.4 Scope of the work 2
1.5 Justification /significance of the study 2
CHAPTER TWO-LITERATURE REVIEW
2.1 Intrusion detection system 3
2.2 Design and implementation 3
2.3 Erisco foods company limited 15
CHAPTER THREE-MATERIAL AND METHODOLOGY
3.1 Material used 16
3.2 Channel relay module 17
3.3 Methodology adapted 26
CHAPTER FOUR- RESULT AND DISCUSSION
4.1 Load module description 27
CHAPTER FIVE-CONCLUSION RECOMMEDATION
5.1 Conclusion 30
5.2 Recommendation 31
REFERENCES