RESEARCH PROPOSAL
RESEARCH PROPOSAL
DATA BREACHES
Project Proposal
Submitted by:
NANDUDU SARAH
REG NO. 23/U/ITE/10513/PE
SCHOOL OF COMPUTING
BACHELOR OF INFORMATION TECHNOLOGY AND COMPUTING
KYAMBOGO UNIVERSITY
Signature: ____________________________
Date: ____________________________
Acknowledgment
I would like to express my sincere gratitude to my lecturers, and peers for their invaluable guidance and
support throughout this research journey. Special thanks to my family and friends for their constant
encouragement.
Table of Contents
Declaration..................................................................................................................................................2
Approval......................................................................................................................................................3
Acknowledgment.........................................................................................................................................4
Chapter One: Introduction..........................................................................................................................6
1.1 Background of the Study...................................................................................................................6
1.2 Problem Statement............................................................................................................................6
1.3 Purpose of the Study.........................................................................................................................6
1.4 Research Objectives...........................................................................................................................6
1.5 Research Scope..................................................................................................................................6
1.6 Significance of the Study....................................................................................................................7
Chapter Two: Literature Review..................................................................................................................8
2.1 Intrusion Detection Systems (IDS).....................................................................................................8
2.2 Data Breaches and Threat Landscape................................................................................................8
2.3 AI and Machine Learning in Cybersecurity.........................................................................................8
2.4 Recent Research and Applications.....................................................................................................8
2.5 Research Gaps...................................................................................................................................8
Chapter Three: Methodology......................................................................................................................9
3.1 Research Design.................................................................................................................................9
3.2 Data Collection..................................................................................................................................9
3.3 Model Development..........................................................................................................................9
3.4 Development Tools and Technologies...............................................................................................9
3.5 System Testing and Evaluation..........................................................................................................9
3.6 Ethical Considerations.......................................................................................................................9
Case Study: AI-Driven Intrusion Detection at XYZ Corp.............................................................................10
References.................................................................................................................................................11
Appendix...................................................................................................................................................12
Chapter One: Introduction
1.1 Background of the Study
In an era where data is the new currency, the frequency and severity of data breaches have reached
alarming levels. Organizations across sectors—ranging from finance to healthcare—are experiencing
increasingly sophisticated attacks that bypass traditional security defenses. Intrusion Detection Systems
(IDSs) have long served as a vital line of defense against cyber intrusions. However, most conventional
IDSs rely on static rules and signature-based detection, which makes them ineffective against zero-day
threats and adaptive cyberattacks. Artificial Intelligence (AI), specifically Machine Learning (ML),
presents a promising solution to these limitations. This study proposes the development of an AI-based
IDS capable of intelligently detecting anomalous behavior in real-time to prevent data breaches.