0% found this document useful (0 votes)
18 views4 pages

R1 Final

The document is a mini project report on an Intrusion Detection System (IDS), detailing its significance in network security by monitoring traffic for potential threats. It outlines the two main types of IDSs: signature-based and behavior-based, and emphasizes the importance of regular testing and maintenance to adapt to evolving threats. The report also acknowledges the support of faculty and infrastructure provided by the college during the project development.

Uploaded by

jefferjam716
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views4 pages

R1 Final

The document is a mini project report on an Intrusion Detection System (IDS), detailing its significance in network security by monitoring traffic for potential threats. It outlines the two main types of IDSs: signature-based and behavior-based, and emphasizes the importance of regular testing and maintenance to adapt to evolving threats. The report also acknowledges the support of faculty and infrastructure provided by the college during the project development.

Uploaded by

jefferjam716
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

INTRUSION DETECTION SYSTEM

A MINI PROJECT REPORT

Submitted by

ASWATH RS (950520104005)

KARTHIK RAJA G (950520104020)

SELVAMANI ALIAS PINEKAS N (950520104039)

VELUKUMARASAMY A (950520104046)

BACHELOR OF ENGINEERING

IN

COMPUTER SCIENCE AND ENGINEERING

DR. SIVANTHI ADITANAR COLLEGE OF ENGINEERING,

TIRUCHNEDUR-628 215

ANNA UNIVERSITY: CHENNAI 600 025

MAY 2023

I
ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report "INTRUSION DETECTION SYSTEM" is


the bonafide work of "ASWATH RS (950520104005), KARTHIK RAJA G
(950520104020), SELVAMANI ALIAS PINEKAS N (950520104039),
VELUKUMARASAMY A (950520104046)" who carried out the Mini Project
work under my supervision.

SIGNATURE SIGNATURE

Dr.G.Wiselin Jiji, M.E., Ph.D., Dr. D.Kesavaraja, M.E., Ph. D.,

PRINCIPAL & HEAD SUPERVISOR

HEAD OF DEPARTMENT, ASSOCIATE PROFESSOR,

Department of Computer Science Department of Computer


Science

And Engineering, And Engineering,

Dr. Sivanthi Aditanar College of Dr. Sivanthi Aditanar College of

Engineering, Engineering,

Tiruchendur-628215. Tiruchendur-628215.

Submitted to the B.E Mini Project viva-voce examination held on


…………………

II
INTERNAL EXAMINER EXTERNAL EXAMINER

ACKNOWLEDGEMENT

First and foremost, we would like to thank The God Almighty, who by
his abundant grace sustained us to complete the course and the project
successfully.

Our sincere thanks to our honorable founder Padma Shri Dr. B. Sivanthi
Aditanar and our beloved chairman Sri. S. Balasubramanian Adityan for
providing us with an excellent infrastructure and conductive atmosphere for
developing our project

We also thank our respected Principal and Head of Department of


Computer Science and Engineering Dr. G. Wiselin Jiji M.E., Ph.D. for giving
us the opportunity to display our professional skills through this project.

We are greatly indebted to Dr. R. Jensi M.E., Ph.D. Associate Professor,


Department of Computer Science and Engineering for her motivation, guidance
throughout the course of this project work.

We are greatly thankful to our guide Dr. D. Kesavaraja M.E., Ph.D.


Associate Professor, Department of Computer Science and Engineering, for his
valuable guidance and motivation, which helped us to complete this project on
time.

We thank all our teaching and non-teaching staff members of the


Computer Science department for their passionate support, for helping us to
identify our flaws and also for the appreciation they gave us in achieving our
goal. Also, we would like to record our deepest gratitude to our parents for
their constant encouragement.

III
ABSTRACT

An intrusion detection system (IDS) is a critical component of modern


network security. It is designed to monitor network traffic and identify
potential security threats, including unauthorized access, misuse, or other
malicious activities. IDSs work by analyzing network traffic and comparing it
against a database of known attack signatures or behavior patterns. They can be
deployed at various points in a network and can generate alerts or take
automated actions to respond to threats. There are two main types of IDSs:
signature-based and behavior-based. Signature-based IDSs use a database of
known attack patterns to identify threats, while behavior-based IDSs use
machine learning and other techniques to analyse network traffic and detect
anomalies. IDSs can be deployed as standalone appliances or integrated into
existing security architectures to provide real-time threat intelligence and
response capabilities. IDSs are essential tools for protecting networks from a
wide range of threats, including malware infections, network breaches, and
insider attacks. However, they can also generate false positives, which can be
time-consuming to investigate, and they require ongoing maintenance and
updates to remain effective against evolving threats. Regular testing and
evaluation of the IDS is important to ensure it is providing adequate protection
against emerging threats. In addition to generating alerts, IDSs can also take
automated actions to respond to threats. However, these automated responses
should be carefully configured and tested to avoid disrupting legitimate traffic
or causing other unintended consequences.

IV

You might also like