0% found this document useful (0 votes)
7 views2 pages

INTRUSION DETECTION SYSTEM Abstract

The project report discusses an Intrusion Detection System (IDS) that monitors network traffic to identify security threats using the ADT-SVM algorithm. It emphasizes the importance of Machine Learning methods in addressing cyber security challenges and evaluates the system's performance using metrics like Detection Rate and False Alarm Rate. The study utilizes the KDD dataset to categorize data attributes and explores various network datasets and associated challenges.

Uploaded by

jefferjam716
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

INTRUSION DETECTION SYSTEM Abstract

The project report discusses an Intrusion Detection System (IDS) that monitors network traffic to identify security threats using the ADT-SVM algorithm. It emphasizes the importance of Machine Learning methods in addressing cyber security challenges and evaluates the system's performance using metrics like Detection Rate and False Alarm Rate. The study utilizes the KDD dataset to categorize data attributes and explores various network datasets and associated challenges.

Uploaded by

jefferjam716
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

INTRUSION DETECTION SYSTEM

A PROJECT REPORT

Submitted by

JEFFERSON JAMES C (950520104014)

MOOSA MULAFFAR MS (950520104026)

Guided by

Dr.D.KESAVARAJA M.E., Ph.D.

BACHELOR OF ENGINEERING

IN

COMPUTER SCIENCE AND ENGINEERING

DR. SIVANTHI ADITANAR COLLEGE OF ENGINEERING,


TIRUCHNEDUR-628 215

ANNA UNIVERSITY: CHENNAI 600 025

MAY 2024
INTRUSION DETECTION SYSTEM

ABSTRACT

An intrusion detection system (IDS) is a critical component of modern network


security. It is designed to monitor network traffic and identify potential security
threats, including unauthorized access, misuse, or other malicious activities.
IDSs work by analyzing network traffic and comparing it against a database of
known attack signatures or behavior patterns.The dynamic challenges in cyber
security through the lens of intrusion detection, utilizing the ADT-SVM
(Adaptive Decision Tree-Support Vector Machine) algorithm. In the context of
a rapidly changing cyber threat landscape facilitated by the Internet, the study
explores the application of Machine Learning (ML) methods, emphasizing the
pivotal role of data. The researchers index, read, and summarize papers
representing various ML methods, focusing on temporal or thermal correlations,
while discussing commonly used network datasets and challenges associated
with ML in cyber security. Using the KDD dataset as a benchmark, the project
employs the ADT-SVM algorithm to categorize data attributes into four classes:
Basic, Content, Traffic, and Host. Evaluation metrics, such as Detection Rate
(DR) and False Alarm Rate (FAR), are then utilized to assess the performance
of an Intrusion Detection System (IDS).

You might also like