SRPDT Project Report Template
SRPDT Project Report Template
A project report submitted in the partial fulfilment of the requirements for the
award of the Degree
of
Submitted By
Name of the student (Roll number)
Designation
Department
MAY - 2025
CERTIFICATE
This is to certify that the project report entitled “Title of the project”
being submitted by Student name(Roll no) in partial fulfilment of the
requirements for the award of Master of Computer Applications, in the
Department of Computer Applications, Vignan’s Foundation for Science,
Technology and Research, (Deemed to be University), Vadlamudi, Guntur
District, Andhra Pradesh, India, is a bonafide work carried out by him under our
guidance and supervision.
External Examiner
ii
DECLARATION
iii
ACKNOWLEDGEMENT
K. Srinivasarao (231FD01028)
iv
PROJECT EXPERIENCE INFORMATION
__________Research_________________
2. Nature of the project :
(Design / Fabrication / Research)
Constraint /
Standard Remarks
v
ABSTRACT
Keywords:
vi
TABLE OF CONTENTS
CHAPTER PAGE
TITLE
NO. NO.
CERTIFICATE ii
DECLARATION iii
ACKNOWLEDGEMENT v
ABSTRACT vi
LIST OF TABLES xiii
LIST OF FIGURES xv
LIST OF ABBREVIATIONS xvii
1 INTRODUCTION 1
1.1 1
1.2 2
1.2.1 2
1.2.2 2
2 LITERATURE SURVEY
3 PROBLEM DEFINITION AND METHODOLOGY
4 RESULTS AND DISCUSSION
5 CONCLUSION AND FUTURE WORK
8.1 Conclusions Derived from The Contributions
8.2 Future Works and Enhancements
BIBLIOGRAPHY 103
vii
LIST OF TABLES
Table Page
TITLE
No. No.
viii
LIST OF FIGURES
Page
Figure No. Title
No.
ix
LIST OF ABBREVIATIONS
x
CHAPTER 1
INTRODUCTION
1.1. GENERAL
The Recurrent Neural Network (RNN) [14] utilized for processing [15] is
called Long Short-Term Memory (LSTM). In this study, we employ LSTM, a
powerful method for modeling time-series data like network traffic, to categorize the
data.
11
1.2. WHAT IS NIDS BACKGROUND OF THE STUDY
1.2.1. Definition
1.4. Motivation
1.7. Challenges
1.8. Objectives
1.10. Summary
Figure 1.1 The classification of IDS detection techniques and sources of data [31]
12
CHAPTER 2
LITERATURE SURVEY
2.1. EXISTING RESEARCH
The accuracy with which intrusion detection systems (IDS) can identify
threats to a network has been greatly increased by using deep learning technology.
With their ability to process massive amounts of data, deep networks have emerged as
A literature review of unsupervised pre-trained networks is shown in Table 2.1.
13
Table 2.1 Literature survey on unsupervised pre-trained networks
14
2.3. SUMMARY
15
CHAPTER 3
METHODOLOGY
3.1. OVERVIEW
3.2. MOTIVATION
3.3. LIMITATIONS OF THE EXISTING SYSTEM
The huge growth in the volume of network data requires efficient techniques
to analyze data increasingly rapidly, efficiently, and effectively so that
sensitive data will be handled appropriately.
3.4. OBJECTIVES
To convert the large volume of network data with mixed values (string and
numeric) into numeric using OneHotEncoder
To provide an improved intrusion detection model without any information
loss using the LightGBM feature selection algorithm so that the efficiency and
accuracy of the system are improved
3.5. METHODOLOGY
3.5.1. Data Collection
16
Figure 3.1 Workflow of the proposed IDS model
3.5.5. Algorithm
17
Precision: This statistic may be calculated using the following formula, and it
indicates the percentage of positive cases recognized by the NIDS out of the total
number of positive predictions.
(True Positives)
Precision= (3.2)
(True Positives+ False Positives)
(True Positives)
Recall= (3.3)
(True Positives+ False Negatives)
F1-score: This metric shows the harmonic mean of accuracy and recall and is
an excellent compromise. This is the calculation formula:
2∗(Precision∗Recall)
F 1−score= (3.4)
(Precision+ Recall)
False Positive Rate (FPR or fall-out): With this measure, we can determine
how often the NIDS incorrectly predicts a good outcome compared to how often it
correctly predicts a negative outcome. This is the formula that is used to determine
this metric:
False Positivession
FPR= (3.5)
(False Positives+ True Negatives)
If the NIDS has a low FPR, it is not producing many false alarms; if it has a high
FPR, it makes many false alerts. A high FPR in NIDS may be troublesome since it
leads to many false positives, which can cause security staff to get overwhelmed and
make it difficult to distinguish between false positives and actual intrusions.
3.8. SUMMARY
18
CHAPTER 4
4.1. OVERVIEW
19
CHAPTER 5
8.1. CONCLUSIONS
20
BIBLIOGRAPHY
21