Intrusion Detection System
Due to the processes involved in the electronic transformation of data, the usage of computer systems and the Internet has recently resulted in major security, privacy, and confidentiality challenges. Although much work has been put into improving the security and privacy of computer systems, these
2025-06-28 16:28:01 - Adil Khan
Intrusion Detection System
Project Area of Specialization Artificial IntelligenceProject SummaryDue to the processes involved in the electronic transformation of data, the usage of computer systems and the Internet has recently resulted in major security, privacy, and confidentiality challenges. Although much work has been put into improving the security and privacy of computer systems, these issues still exist. In truth, there is no such thing as a completely secure system in the world. Several tools are being developed and employed in various sorts of network attacks as a result of the rise of several types of attacks. For this, we have proposed an intrusion detection system that will help to identify and monitor attacks.
Intrusion detection systems are one of those tools which can monitor a variety of network systems. The IDS can identify and monitor attacks aimed at compromising a system's security aspects (confidentiality, availability, and integrity). It will filter the incoming data packets and identify known, unknown intrusions, viruses, or threats. We will develop an intrusion detection system (IDS) that will detect the intrusion and prevent those intrusions. Monitoring traffic, scanning the data packet and ports for suspicious data. This system will give all the information related to the server and network like how many ports are open and how many ports are closed and gives all data packets information like which data packet coming from which source and reached from which destination. For this, a machine learning model for intrusion detection will be used.
Project Objectives- We will use multiple algorithms of the machine learning and test them on our dataset. Then we will finalize that one which will provide us the best accuracy.
- To design and develop a server application based on IDS (intrusion detection system) which can detect known and unknown intrusions on the server-side.
- To monitor the traffic, scan the data packet and ports for suspicious data.
- To make “IDS” efficient with the help of various “Machine Learning” algorithms.
- To recognize the viruses or malicious attacks based on their behavior.
- To make our IDS efficient that it will learn from the upcoming viruses and malicious attacks as well as from the experience.
- To detect all the malicious attacks and viruses that can attack the server-side.
Scrum Methodology will be used to develop our system for managing work because scrum is an agile way to manage a project. Scrum is an agile framework for managing work with an emphasis on software development. It is designed for development teams from three to nine members who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less, most commonly two weeks) and track progress and re-plan in 15-minute stand-up meetings, called daily scrums. Approaches to coordinating the work of multiple scrum teams in larger organizations include the Large-scale Scrum Scaled Agile Framework. The development of a secure server system involves phases and those phases are as under:
- · Sprint planning.
- · Daily scrum.
- · Sprint review.
Sprint planning is a way to team hold and plan and manually discuss the plan and method among team members and the scope of the work. Choose the backlog product and completed it in one sprint and prepare the needed work related to the product.
The daily scrum is the technique to discuss the plan with your team member and design a short term goal anyone is welcome only the development team should contribute to it and most benefit of this phase is each team member tells their problem and discuss the problems with other team members and every team member will provide solutions base of their past experiences.
Sprint review at the end of the team holds this phase help to review the performance of our project how much work is completed or not completed and present the work to your team leader and stakeholders to give the idea of how much work will remain.
Benefits of the Project- Detailed records of malicious attacks help administrators identify weaknesses, address problems and watch out for future attacks.
- Biggest benefit of an IDS is identifying security threats to your networks.
- The IDS is designed to ensure malicious attacks don’t spread within the network and cause more damage.
- Intrusion detection systems are a lot like fire alarms. Just as a fire alarm detects smoke, an intrusion detection system idenitifies incidents and potential threats.
- The ability to detect attacks that cannot be automatically identified by firewalls, antivirus technologies and other enterprise security controls.
- It enables you to detect and respond to malicious traffic.
- The primary benefit of an intrusion detection system is to ensure IT personnel is notified when an attack or network intrusion might be taking place.
- The network IDS monitors network traffic and triggers alerts when suspicious activity or known threats are detected.
We will be using the 3 main algorithms of the machine learning for the dataset which will be generated by us for the intrusion detection system to get better results and accuracy. As we will create the dataset whose name will be "Malicious traffic" for this intrusion detection sytem. The list of the ML algorithms are as follow:
- SVM (Support Vector machine)
- MLP
- Decison Tree.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 62000 | |||
| Graphic card 6gb | Equipment | 1 | 52000 | 52000 |
| Artificial intelligence Course | Miscellaneous | 1 | 5000 | 5000 |
| Cyber Security security | Miscellaneous | 1 | 5000 | 5000 |