Intrusion Detection System

Due to the processes involved in the electronic transformation of data, the usage of computer systems and the Internet has recently resulted in major security, privacy, and confidentiality challenges. Although much work has been put into improving the security and privacy of computer systems, these

2025-06-28 16:28:01 - Adil Khan

Project Title

Intrusion Detection System

Project Area of Specialization Artificial IntelligenceProject Summary

Due to the processes involved in the electronic transformation of data, the usage of computer systems and the Internet has recently resulted in major security, privacy, and confidentiality challenges. Although much work has been put into improving the security and privacy of computer systems, these issues still exist. In truth, there is no such thing as a completely secure system in the world. Several tools are being developed and employed in various sorts of network attacks as a result of the rise of several types of attacks. For this, we have proposed an intrusion detection system that will help to identify and monitor attacks.

Intrusion detection systems are one of those tools which can monitor a variety of network systems. The IDS can identify and monitor attacks aimed at compromising a system's security aspects (confidentiality, availability, and integrity). It will filter the incoming data packets and identify known, unknown intrusions, viruses, or threats. We will develop an intrusion detection system (IDS) that will detect the intrusion and prevent those intrusions. Monitoring traffic, scanning the data packet and ports for suspicious data. This system will give all the information related to the server and network like how many ports are open and how many ports are closed and gives all data packets information like which data packet coming from which source and reached from which destination. For this, a machine learning model for intrusion detection will be used.

Project Objectives Project Implementation Method

Scrum Methodology will be used to develop our system for managing work because scrum is an agile way to manage a project. Scrum is an agile framework for managing work with an emphasis on software development. It is designed for development teams from three to nine members who break their work into actions that can be completed within timeboxed iterations, called sprints (30 days or less, most commonly two weeks) and track progress and re-plan in 15-minute stand-up meetings, called daily scrums. Approaches to coordinating the work of multiple scrum teams in larger organizations include the Large-scale Scrum Scaled Agile Framework. The development of a secure server system involves phases and those phases are as under:

Sprint planning is a way to team hold and plan and manually discuss the plan and method among team members and the scope of the work. Choose the backlog product and completed it in one sprint and prepare the needed work related to the product.

The daily scrum is the technique to discuss the plan with your team member and design a short term goal anyone is welcome only the development team should contribute to it and most benefit of this phase is each team member tells their problem and discuss the problems with other team members and every team member will provide solutions base of their past experiences.

Sprint review at the end of the team holds this phase help to review the performance of our project how much work is completed or not completed and present the work to your team leader and stakeholders to give the idea of how much work will remain.

Benefits of the Project Technical Details of Final Deliverable

We will be using the 3 main algorithms of the machine learning for the dataset which will be generated by us for the intrusion detection system to get better results and accuracy. As we will create the dataset whose name will be "Malicious traffic" for this intrusion detection sytem. The list of the ML algorithms are as follow:

Final Deliverable of the Project Software SystemCore Industry ITOther IndustriesCore Technology Artificial Intelligence(AI)Other TechnologiesSustainable Development Goals Partnerships to achieve the GoalRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 62000
Graphic card 6gb Equipment15200052000
Artificial intelligence Course Miscellaneous 150005000
Cyber Security security Miscellaneous 150005000

More Posts