Project Overview
Project Overview
Project Overview
Project Name: Intrusion Detection System (IDS) with Machine Learning Integration
Purpose: To detect and respond to suspicious activities in a network environment,
providing real-time alerts through email, browser notifications, and detailed logs.
2. Key Features
1. Intrusion Detection:
o Automatically detects suspicious activities using predefined rules and machine
learning.
o Logs detailed activity reports.
2. Real-Time Alerts:
o Sends email notifications to administrators upon detecting intrusions.
o Displays browser notifications for instant on-screen alerts.
3. Browser Interface:
o A responsive web dashboard to monitor detected activities in real-time.
o Includes an activity log and a "Clear Log" button for better management.
4. Machine Learning Integration:
o Utilizes a pre-trained ML model to classify network traffic into normal and
suspicious categories.
o Enables dynamic and intelligent decision-making based on the data.
3. Technology Stack
1. Frontend:
o HTML, CSS for structure and styling.
o JavaScript and Socket.IO for real-time updates.
2. Backend:
o Python with Flask for the server.
o Machine Learning (Scikit-learn) for traffic analysis.
3. Email Alerts:
o SMTP protocol for sending emails with alerts.
4. Machine Learning:
o Dataset: [Specify dataset used, e.g., KDD Cup 99 or NSL-KDD].
o Model: Logistic Regression or Random Forest trained on network traffic data.
o Features: Packets per second, source/destination IP, and protocol type.
4. Workflow
1. Data Collection:
o Captures network packets using simulated or live data streams.
2. Preprocessing:
o Extracts relevant features and processes them for ML classification.
3. Prediction:
o Passes the data to the ML model to classify as normal or intrusion.
4. Response:
o Sends alerts to the admin (email and browser).
o Updates the dashboard with the detected activity.
Scenarios Tested:
o Normal browsing activity (classified as "normal").
o Simulated malicious activities (classified as "intrusion").
Outputs:
o Detailed logs in the browser interface.
o Email alerts with timestamps and activity details.
Evaluation:
o Machine learning accuracy: [Specify accuracy achieved].
7. Future Enhancements
8. Demonstration Steps