0% found this document useful (0 votes)
17 views

ids fi 1

The document is a project report on an Intrusion Detection System (IDS) submitted by students Jefferson James C and Moosa Mulaffar MS as part of their Bachelor of Engineering in Computer Science and Engineering. It outlines the importance of IDS in network security, detailing its functionality, types, and the need for regular maintenance and updates. The report includes various sections such as system analysis, software description, testing, and future enhancements.

Uploaded by

jefferjam716
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

ids fi 1

The document is a project report on an Intrusion Detection System (IDS) submitted by students Jefferson James C and Moosa Mulaffar MS as part of their Bachelor of Engineering in Computer Science and Engineering. It outlines the importance of IDS in network security, detailing its functionality, types, and the need for regular maintenance and updates. The report includes various sections such as system analysis, software description, testing, and future enhancements.

Uploaded by

jefferjam716
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

INTRUSION DETECTION SYSTEM

A PROJECT REPORT

Submitted by

JEFFERSON JAMES C (950520104014)

MOOSA MULAFFAR MS (950520104026)

BACHELOR OF ENGINEERING

IN

COMPUTER SCIENCE AND ENGINEERING

Dr. SIVANTHI ADITANAR COLLEGE OF ENGINEERING,


TIRUCHNEDUR-628 215

ANNA UNIVERSITY: CHENNAI 600 025

MAY 2024
ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report "INTRUSION DETECTION SYSTEM" is


the bonafide work of "JEFFERSON JAMES C (950520104014), MOOSA
MULAFFAR MS (950520104026)" who carried out the Project work under my
supervision.

SIGNATURE SIGNATURE

Dr.G.Wiselin Jiji, M.E., Ph.D., Dr.D .Kesavaraja, M.E., Ph. D.,

PRINCIPAL & SUPERVISOR

HEAD OF DEPARTMENT, ASSOCIATE PROFESSOR,

Department of Computer Department of Computer

Science and Engineering, Science and Engineering,

Dr.Sivanthi Aditanar College Dr. Sivanthi Aditanar College

of Engineering, of Engineering,

Tiruchendur-628215. Tiruchendur-628215.

Submitted to the B.E Project viva-voce examination held on…………………

INTERNAL EXAMINER EXTERNAL EXAMINER


ACKNOWLEDGEMENT

First and foremost, we would like to thank The God Almighty, who by his
abundant grace sustained us to complete the project successfully.

Our sincere thanks to our honorable founder Padmashri Dr. B. Sivanthi


Adithan and our beloved chairman Sri. S. Balasubramanian Adityan for
providing us with an excellent infrastructure and conductive atmosphere for
developing our project

We also thank our respected Principal and Head of Department of Computer


Science and Engineering Dr. G. Wiselin Jiji M.E., Ph.D. for giving us the
opportunity to display our professional skills through this project.

Our heartfelt thanks to our project coordinator, Mrs.S.V.Anandhi M.E.,


(Ph.D)., Assistant professor for the support and advice she has given us through
our project reviews.

We are greatly thankful to our guide Dr. D .Kesavaraja, M.E., Ph. D.


Associate professor of Department of Computer Science and Engineering for her
valuable guidance and motivation, which helped us to complete this project on
time.

We thank all our teaching and non-teaching staff members of the Computer
Science department for their passionate support, for helping us to identify our
flaws and also for the appreciation they gave us in achieving our goal. Also, we
would like to record our deepest gratitude to our parents for their constant
encouragement.

iii
ABSTRACT

An intrusion detection system (IDS) is a critical component of modern


network security. It is designed to monitor network traffic and identify potential
security threats, including unauthorized access, misuse, or other malicious
activities. IDSs work by analysing network traffic and comparing it against a
database of known attack signatures or behaviour patterns. They can be
deployed at various points in a network and can generate alerts or take
automated actions to respond to threats. There are two main types of IDSs:
signature-based and behaviour-based. Signature-based IDSs use a database of
known attack patterns to identify threats, while behaviour-based IDSs use
machine learning and other techniques to analyse network traffic and detect
anomalies. IDSs can be deployed as standalone appliances or integrated into
existing security architectures to provide real-time threat intelligence and
response capabilities. IDSs are essential tools for protecting networks from a
wide range of threats, including malware infections, network breaches, and
insider attacks. However, they can also generate false positives, which can be
time-consuming to investigate, and they require ongoing maintenance and
updates to remain effective against evolving threats. Regular testing and
evaluation of the IDS is important to ensure it is providing adequate protection
against emerging threats. In addition to generating alerts, IDSs can also take
automated actions to respond to threats. However, these automated responses
should be carefully configured and tested to avoid disrupting legitimate traffic
or causing other unintended consequences.

iv
TABLE OF CONTENTS

CHAPTER TITLE PAGE


NO NO
ABSTRACT iv
LIST OF FIGURES vii
LIST OF ABBREVIATIONS viii
1 INTRODUCTION 1
1.1 FEATURE SELECTION 1
1.2 FEATURE ENGINEERING 2
1.3 CLASSIFICATION 3
1.4 MACHINE LEARNING 4
1.5 ENSEMBLE LEARNING 4
1.6 ANOMALY DETECTION 5
1.7 INTRUSION DETECTION SYSTEM 5
1.8 OBJECTIVES 6
2 LITERATURE SURVEY 7
3 SYSTEM ANALYSIS 16
3.1 EXISTING SYSTEM 16
3.1.1 DRAWBACKS 16
3.2 PROPOSED SYSTEM 17
3.2.1 ADVANTAGES 18
3.3 FEASIBILITY STUDY 18
3.3.1 TECHNICAL FEASIBILITY 18
3.3.2 OPERATIONAL FEASIBILITY 19
3.3.3 ECONOMICAL FEASIBILITY 20
4 SYSTEM SPECIFICATION 21
4.1 HARDWARE CONFIGURATION 21
4.2 SOFTWARE SPECIFICATION 21

v
5 SOFTWARE DESCRIPTION 22
5.1 FRONT END 22
6 PROJECT DESCRIPTION 29
6.1 PROBLEM DEFINITION 29
6.2 MODULE DESCRIPTION 29
6.3 SYSTEM FLOW DIAGRAM 31
6.4 INPUT DESIGN 32
6.5 OUTPUT DESIGN 32
7 SYSTEM TESTING AND 33
IMPLEMENTATION
7.1 SYSTEM TESTING 33
7.2 SYSTEM IMPLEMENTATION 33
8 SYSTEM MAINTENANCE 34
8.1 CORRECTIVE MAINTENANCE 35
8.2 ADAPTIVE MAINTENANCE 35
8.3 PERFECTIVE MAINTENANCE 36
9 CONCLUSION AND FUTURE 37
ENHANCEMENT
10 APPENDICES 38
10.1 SOURCE CODE 38
10.2 SCREEN SHOTS 54
11 REFERENCES 56

vi
LIST OF FIGURES

FIGURE NO FIGURE NAME PAGE NUMBER

1 FEATURE SELECTION 2

2 FEATURE ENGINEERING 3

3 SYSTEM FLOW DIAGRAM 31

vii
LIST OF ABBREVATIONS

ABBREVATIONS
NIDS) NETWORK INTRUSION DETECTION
SYSTEMS
DSL DIGITAL SUBSCRIBER LINE
TDM) TIME DIVISION MULTIPLEXING
EPON), ETHERNET PASSIVE OPTICAL NETWORK
(NG-PON2 NEXT-GENERATION PASSIVE OPTICAL
NETWORK STAGE
WDM WAVELENGTHDIVISION MULTIPLEXING
(WLAN WIRELESS LOCAL ACCESS NETWORK
IOT INTERNET OF THINGS
D-FES DEEP - FEATURE EXTRACTION AND
SELECTION
AWID) AEGEAN WI-FI INTRUSION DATASET
B2B BUSINESS-TO BUSINESS
GB GRADIENT BOOSTING
RF RANDOM FOREST
CNN CONVOLUTIONAL NEURAL NETWORK

viii

You might also like