SlideShare a Scribd company logo
1 of 12
Intrusion Detection System Enhancing Cyber
Security Through AI and ML-Based
DEPARTMENT OF
TELECOMMUNICATION, MUET BATCH
20TL
FYP Presentation
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
Naimtaullah (member)
20TL018
Zahid Ab Kunbhar (GL)
20TL045
Mirza Sufiyan(member)
20-19TL79
Dr Aftab Ahmed Memon (Supervisor) Sir Talha Qaimkhani (Co-supervisor)
1. Problem Statement
2. Background and Motivation
3. Literature Review
4. Aim and Objectives
5. Methodology
6. Timeline
7. Social Impacts
8. References
CONTENTS
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
PROBLEM STATEMENT
Traditional cyber-security struggles against evolving cyber
threats.
This project deploys AI and ML for a dynamic, preemptive
approach, setting new benchmarks for rapid threat response.
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
BACKGROUND & MOTIVATION
In the current tech era, global cybercrime escalation calls for proactive
measures. Committed to addressing this surge
 our focus is on leveraging cutting-edge technologies
 Artificial Intelligence (AI) and Machine Learning (ML).
 By harnessing AI and ML algorithms, we aim to fortify defenses against
cyber threats,
developing advanced systems to counteract attacks and set a benchmark
for enhanced cyber-security in this dynamic landscape.
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
LITERATURE REVIIEW
REF TITLE SUMMARY REMARKS
01
Intrusion Detection Systems using
Supervised Machine Learning Techniques:
A survey
In this paper the Detecting unique attacks, especially anomalies,
poses a significant challenge.
Our study highlights the
pivotal role of Intrusion
Detection Systems (IDS)
and supervised learning
algorithms in countering
cyber threats, emphasizing
optimal performance for
effective anomaly
detection.
02
Survey of intrusion detection systems:
techniques, datasets and challenges
The paper provides a current taxonomy, reviews IDS research, and classifies
proposed systems. It outlines existing IDSs, surveys data-mining techniques, and
explores signature-based and anomaly-based methods.
Challenges in building IDS,
varying effectiveness of
data mining techniques,
and critical evaluation
factors like time are
discussed, highlighting gaps
in existing research.
03
Enhancement of Intrusion Detection
System using Machine Learning
This research explores the surge in network attacks in the digital age. Utilizing
Intrusion Detection Systems (IDS), as depicted enhance security by closely
monitoring firewall and router functions.
The research delves into the
rising challenges of digital-era
network attacks. Utilizing IDS
and machine learning it
bolsters cyber security by
enhancing threat detection
precision, minimizing false
alarms.
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
AIMS AND OBJECTIVES
AIM OF THE PROJECT
• Develop an Intrusion Detection System (IDS) leveraging AI and ML for enhanced cyber security.
• Achieve real-time identification, minimizing false positives/negatives.
OBJECTIVES
• Implement an autonomous response system for threat mitigation.
• Achieve precise threat detection through optimized feature extraction.
• Ensure real-time responsiveness to counter evolving threats promptly.
• Evaluate IDS with emphasis on accuracy and minimal false positives. Contribute to cyber
security knowledge by addressing limitations and suggesting future research for
enhanced intrusion detection source use, and provide comprehensive documentation.
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
TOOLS AND SOCIAL IMPACTS:
TOOLS
 Python for AI/ML development
• TensorFlow , Pandas , Keras , Wireshark , Jupyter
Notebooks , Docker , Seaborn , HashLib , SQLite
we will utilize these tools for our project implementations
SOCIAL IMPACTS (SDG’s)
• Industry, Innovation, and Infrastructure
• Peace, Justice, and Strong Institutions
• Quality Education
• Decent Work and Economic Growth
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
TIMELINE
DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
Working on PPT
07/12/2023
15/12/2023
12/04/2023
10/01/2024
22/01/2023
Get Familiar With Tools
Literature Review
Finalize the PPT work
Getting the stuff
REFRENCES:
1. Khraisat et al. Cybersecurity (2019) 2:20 Survey of intrusion detection systems: techniques,
datasets and challenges Ansam Khraisat* , Iqbal Gondal, Peter Vamplew and Joarder Kamruzzaman.
2. A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning
P.; Newe, T.; Dhirani, L.L.; O’Connell, E.; O’Shea, D.; Lee, B.; Rao, M. A Study of Network Intrusion Detection
Systems Using Artificial Intelligence/Machine Learning. Appl. Sci. 2022, 12, 11752.
3. A comprehensive review of AI based intrusion detection system Sowmya T.a,* , Mary Anita E.A.b d 30
October 2022
REFRENCES:
4. The 13th International Conference on Ambient Systems, Networks and Technologies (ANT)
March 22-25, 2022, Porto, Portugal Intrusion Detection Systems using Supervised Machine
Learning Techniques: A survey Emad E. Abdallah*, Wafa’ Eleisah, Ahmed Fawzi Otoom
5. Hammad, M., El-medany , W., & Ismail, Y. (2020, December). Intrusion Detection System using
Feature Selection With Clustering and Classification Machine Learning Algorithms on the
UNSW-NB15 dataset. In 2020 International Conference on Innovation and Intelligence for
Informatics, Computing and Technologies (3ICT) (pp. 1-6). IEEE
Any Query you may ask.
THANK YOU!

More Related Content

Similar to 20TL045_IDS for Cyber Security AI,ML Based (1).pptx

Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 

Similar to 20TL045_IDS for Cyber Security AI,ML Based (1).pptx (20)

Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Management Structures for IT Security
Management Structures for IT SecurityManagement Structures for IT Security
Management Structures for IT Security
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
188
188188
188
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position PaperMITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 

Recently uploaded

Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
Sampad Kar
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 

Recently uploaded (20)

Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 

20TL045_IDS for Cyber Security AI,ML Based (1).pptx

  • 1. Intrusion Detection System Enhancing Cyber Security Through AI and ML-Based DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 2. FYP Presentation DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL Naimtaullah (member) 20TL018 Zahid Ab Kunbhar (GL) 20TL045 Mirza Sufiyan(member) 20-19TL79 Dr Aftab Ahmed Memon (Supervisor) Sir Talha Qaimkhani (Co-supervisor)
  • 3. 1. Problem Statement 2. Background and Motivation 3. Literature Review 4. Aim and Objectives 5. Methodology 6. Timeline 7. Social Impacts 8. References CONTENTS DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 4. PROBLEM STATEMENT Traditional cyber-security struggles against evolving cyber threats. This project deploys AI and ML for a dynamic, preemptive approach, setting new benchmarks for rapid threat response. DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 5. BACKGROUND & MOTIVATION In the current tech era, global cybercrime escalation calls for proactive measures. Committed to addressing this surge  our focus is on leveraging cutting-edge technologies  Artificial Intelligence (AI) and Machine Learning (ML).  By harnessing AI and ML algorithms, we aim to fortify defenses against cyber threats, developing advanced systems to counteract attacks and set a benchmark for enhanced cyber-security in this dynamic landscape. DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 6. LITERATURE REVIIEW REF TITLE SUMMARY REMARKS 01 Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey In this paper the Detecting unique attacks, especially anomalies, poses a significant challenge. Our study highlights the pivotal role of Intrusion Detection Systems (IDS) and supervised learning algorithms in countering cyber threats, emphasizing optimal performance for effective anomaly detection. 02 Survey of intrusion detection systems: techniques, datasets and challenges The paper provides a current taxonomy, reviews IDS research, and classifies proposed systems. It outlines existing IDSs, surveys data-mining techniques, and explores signature-based and anomaly-based methods. Challenges in building IDS, varying effectiveness of data mining techniques, and critical evaluation factors like time are discussed, highlighting gaps in existing research. 03 Enhancement of Intrusion Detection System using Machine Learning This research explores the surge in network attacks in the digital age. Utilizing Intrusion Detection Systems (IDS), as depicted enhance security by closely monitoring firewall and router functions. The research delves into the rising challenges of digital-era network attacks. Utilizing IDS and machine learning it bolsters cyber security by enhancing threat detection precision, minimizing false alarms. DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 7. AIMS AND OBJECTIVES AIM OF THE PROJECT • Develop an Intrusion Detection System (IDS) leveraging AI and ML for enhanced cyber security. • Achieve real-time identification, minimizing false positives/negatives. OBJECTIVES • Implement an autonomous response system for threat mitigation. • Achieve precise threat detection through optimized feature extraction. • Ensure real-time responsiveness to counter evolving threats promptly. • Evaluate IDS with emphasis on accuracy and minimal false positives. Contribute to cyber security knowledge by addressing limitations and suggesting future research for enhanced intrusion detection source use, and provide comprehensive documentation. DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 8. TOOLS AND SOCIAL IMPACTS: TOOLS  Python for AI/ML development • TensorFlow , Pandas , Keras , Wireshark , Jupyter Notebooks , Docker , Seaborn , HashLib , SQLite we will utilize these tools for our project implementations SOCIAL IMPACTS (SDG’s) • Industry, Innovation, and Infrastructure • Peace, Justice, and Strong Institutions • Quality Education • Decent Work and Economic Growth DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL
  • 9. TIMELINE DEPARTMENT OF TELECOMMUNICATION, MUET BATCH 20TL Working on PPT 07/12/2023 15/12/2023 12/04/2023 10/01/2024 22/01/2023 Get Familiar With Tools Literature Review Finalize the PPT work Getting the stuff
  • 10. REFRENCES: 1. Khraisat et al. Cybersecurity (2019) 2:20 Survey of intrusion detection systems: techniques, datasets and challenges Ansam Khraisat* , Iqbal Gondal, Peter Vamplew and Joarder Kamruzzaman. 2. A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning P.; Newe, T.; Dhirani, L.L.; O’Connell, E.; O’Shea, D.; Lee, B.; Rao, M. A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning. Appl. Sci. 2022, 12, 11752. 3. A comprehensive review of AI based intrusion detection system Sowmya T.a,* , Mary Anita E.A.b d 30 October 2022
  • 11. REFRENCES: 4. The 13th International Conference on Ambient Systems, Networks and Technologies (ANT) March 22-25, 2022, Porto, Portugal Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey Emad E. Abdallah*, Wafa’ Eleisah, Ahmed Fawzi Otoom 5. Hammad, M., El-medany , W., & Ismail, Y. (2020, December). Intrusion Detection System using Feature Selection With Clustering and Classification Machine Learning Algorithms on the UNSW-NB15 dataset. In 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) (pp. 1-6). IEEE
  • 12. Any Query you may ask. THANK YOU!

Editor's Notes

  1. 62759249-615a-433a-878f-5ccff6d67f3d
  2. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  3. 53ea509b-6c50-4bc6-9755-f76878922f7f
  4. 53ea509b-6c50-4bc6-9755-f76878922f7f
  5. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  6. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  7. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  8. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  9. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  10. 72eb133f-e959-4c09-a4cb-c16a5aff074b
  11. 07f5b99b-35de-4556-b278-a0c7e1125488