1. “ Accurate and Robust Network Intrusion Detection System ”
EAST POINT COLLEGE OF ENGINEERING AND TECHNOLOGY
Department Information Science And Engineering
PROJECT PHASE 1
TEAM MEMBERS:
Deepthi N
Manjunath S
Nanditha V
Pallavi R
UNDER GUIDANCE :
Mrs. Teena K B
Assistant Professor
Department of ISE
2. ABSTRACT
Network Intrusion Detection Systems (NIDSs) using pattern matching have a fatal weakness in that
they cannot detect new attacks because they only learn existing patterns and use them to detect those
attacks.
To solve this problem, a machine learning-based NIDS (ML-NIDS) that detects anomalies through
ML algorithms by analysing behaviours of protocols.
However, the ML-NIDS learns the characteristics of attack traffic based on training data, so it, too, is
inevitably vulnerable to attacks that have not been learned, just like pattern-matching machine
learning.
Various experiments confirmed that the proposed method can detect intrusion sessions early (before
sessions terminate) significantly improving the robustness of the existing ML-NIDS.
The proposed approach can provide more robust and more accurate classification with the same
classification datasets compared to existing approaches,
so we expect it will be used as one of feasible solutions to overcome weakness and limitation of
existing ML-NIDSs.
3. Literature Survey
S.
No
Journal
Type
Authors Title Outcomes
1 IEEE, 2019 A. Halimaa
A. and K.
Sundarakant
ham
Machine learning
basedintrusion detection
system,’’ in Proc. 3rd Int.
Conf. Trends
Electron.Informat
In this paper an intrusion detection system is
employed to investigate hostile behaviour that takes
place within a network or a system. Software or
hardware used for intrusion detection searches a
network or system for suspicious behaviour.
2 IEEE, 2017 A. Borkar,
A. Donode,
and A.
Kumari
A survey on intrusion
detection system (IDS)
and internal intrusion
detection and protection
system (IIDPS)
In this paper we will show the only necessity for an
organisation is to safeguard its official and
confidential data against outside and internal
attackers.
4. S.
No
Journal
Type
Authors Title Outcomes
3 IEEE, 2014 V. Gupta, M. Singh,
and V. K. Bhalla
Pattern matching
algorithms for intrusion
detection and prevention
system
In this paper in order to identify
known attacks, these systems use
their signatures. The core of
IDPSs, the pattern matching
algorithm, is used to identify
signatures. Because to technical
developments
4 IEEE, 2010 Z. Zhou,
C.Zhongwen,
Z.Tiecheng, and
G.Xiaohui
The study on network
intrusion detection
system of snort
In this paper initial line of defence
against network security is the
intrusion detection system a well-
known intrusion detection.
5. HARDWARE & SOFTWARE REQUIREMENTS
HARDWARE Configuration:
• Processor - I3/Intel Processor
• Hard Disk -160GB
• RAM - 8Gb
SOFTWARE Configuration:
• Operating System : Windows 7/8/10 .
• IDE : Pycharm.
• Libraries Used : Numpy, Pandas, OS,django, MySQL.
• Technology : Python 3.6+.
6. Functional and non-functional requirements:
Requirement’s analysis is very critical process that enables the success of a system or software
project to be assessed.
Requirements are generally split into two types:
Functional and
non-functional requirements.
Functional Requirements: These are the requirements that the end user specifically
demands as basic facilities that the system should offer. All these functionalities need to be
necessarily incorporated into the system as a part of the contract. These are represented or
stated in the form of input to be given to the system, the operation performed and the output
expected. They are basically the requirements stated by the user which one can see directly in
the final product, unlike the non-functional requirements.
7. Examples of functional requirements:
1) Authentication of user whenever he/she logs into the system
2) System shutdown in case of a cyber-attack
3) A verification email is sent to user whenever he/she register for the first time on some
software system.
Non-functional requirements: These are basically the quality constraints that the
system must satisfy according to the project contract. The priority or extent to which these
factors are implemented varies from one project to other. They are also called non-behavioral
requirements.
8. They basically deal with issues like:
Portability
Security
Maintainability
Reliability
Scalability
Performance
Reusability
Flexibility
Examples of non-functional requirements:
1) Emails should be sent with a latency of no greater than 12 hours from such an activity.
2) The processing of each request should be done within 10 seconds
3) The site should load in 3 seconds whenever of simultaneous users are > 10000