Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | 03-134191-027, Muhammad Ibrahim | |
dc.contributor.author | 03-134191-041, Mohamed Ali | |
dc.date.accessioned | 2024-12-12T07:56:01Z | |
dc.date.available | 2024-12-12T07:56:01Z | |
dc.date.issued | 2023-01-05 | |
dc.identifier.uri | http://hdl.handle.net/123456789/18754 | |
dc.description | Supervisor: Zupash Awais | en_US |
dc.description.abstract | Due to the processes involved in the electronic transformation of data, the usage of computer systems and the Internet has recently resulted in major security, privacy, and confidentiality challenges. Although much work has been put into improving the security and privacy of computer systems, these issues still exist. In truth, there is no such thing as a completely secure system in the world. Several tools are being developed and employed in various sorts of network attacks as a result of the rise of several types of attacks. For this, we have proposed an intrusion detection system that will help to identify and monitor attacks. Intrusion detection systems are one of those tools which can monitor a variety of network systems. The IDS can identify and monitor attacks aimed at compromising a system's security aspects (confidentiality, availability, and integrity). It will filter the incoming data packets and identify known, and unknown intrusions, viruses, or threats. We will develop an intrusion detection system (IDS) that will detect the intrusion and prevent those intrusions. Monitoring traffic, scanning the data packet and ports for suspicious data. This system will give all the information related to the server and network like how many ports are open and how many ports are closed and gives all data packets information like which data packet coming from which source and reached from which destination. For this, a machine learning model for intrusion detection will be used | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | ;BULC1013 | |
dc.title | Intrusion Detection System | en_US |
dc.type | Project Reports | en_US |