Intrusion Detection System

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author 03-134191-027, Muhammad Ibrahim
dc.contributor.author 03-134191-041, Mohamed Ali
dc.date.accessioned 2024-12-12T07:56:01Z
dc.date.available 2024-12-12T07:56:01Z
dc.date.issued 2023-01-05
dc.identifier.uri http://hdl.handle.net/123456789/18754
dc.description Supervisor: Zupash Awais en_US
dc.description.abstract Due to the processes involved in the electronic transformation of data, the usage of computer systems and the Internet has recently resulted in major security, privacy, and confidentiality challenges. Although much work has been put into improving the security and privacy of computer systems, these issues still exist. In truth, there is no such thing as a completely secure system in the world. Several tools are being developed and employed in various sorts of network attacks as a result of the rise of several types of attacks. For this, we have proposed an intrusion detection system that will help to identify and monitor attacks. Intrusion detection systems are one of those tools which can monitor a variety of network systems. The IDS can identify and monitor attacks aimed at compromising a system's security aspects (confidentiality, availability, and integrity). It will filter the incoming data packets and identify known, and unknown intrusions, viruses, or threats. We will develop an intrusion detection system (IDS) that will detect the intrusion and prevent those intrusions. Monitoring traffic, scanning the data packet and ports for suspicious data. This system will give all the information related to the server and network like how many ports are open and how many ports are closed and gives all data packets information like which data packet coming from which source and reached from which destination. For this, a machine learning model for intrusion detection will be used en_US
dc.language.iso en en_US
dc.relation.ispartofseries ;BULC1013
dc.title Intrusion Detection System en_US
dc.type Project Reports en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account