INTRUSION DETECTION SYSTEM
A PROJECT REPORT
Submitted by
JEFFERSON JAMES C (950520104014)
MOOSA MULAFFAR MS (950520104026)
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING
Dr. SIVANTHI ADITANAR COLLEGE OF ENGINEERING,
TIRUCHNEDUR-628 215
ANNA UNIVERSITY: CHENNAI 600 025
MAY 2024
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE
Certified that this project report "INTRUSION DETECTION SYSTEM" is
the bonafide work of "JEFFERSON JAMES C (950520104014), MOOSA
MULAFFAR MS (950520104026)" who carried out the Project work under my
supervision.
SIGNATURE SIGNATURE
[Link] Jiji, M.E., Ph.D., Dr.D .Kesavaraja, M.E., Ph. D.,
PRINCIPAL & SUPERVISOR
HEAD OF DEPARTMENT, ASSOCIATE PROFESSOR,
Department of Computer Department of Computer
Science and Engineering, Science and Engineering,
[Link] Aditanar College Dr. Sivanthi Aditanar College
of Engineering, of Engineering,
Tiruchendur-628215. Tiruchendur-628215.
Submitted to the B.E Project viva-voce examination held on…………………
INTERNAL EXAMINER EXTERNAL EXAMINER
ACKNOWLEDGEMENT
First and foremost, we would like to thank The God Almighty, who
by his abundant grace sustained us to complete the project
successfully.
Our sincere thanks to our honorable founder Padmashri Dr. B.
Sivanthi Adithan and our beloved chairman Sri. S.
Balasubramanian Adityan for providing us with an excellent
infrastructure and conductive atmosphere for developing our project
We also thank our respected Principal and Head of Department of
Computer Science and Engineering Dr. G. Wiselin Jiji M.E., Ph.D.
for giving us the opportunity to display our professional skills through
this project.
Our heartfelt thanks to our project coordinator, [Link]
M.E., (Ph.D)., Assistant professor for the support and advice she has
given us through our project reviews.
We are greatly thankful to our guide Dr. D .Kesavaraja, M.E., Ph.
D., Associate professor of Department of Computer Science
and Engineering for her valuable guidance and motivation, which
helped us to complete this project on time.
We thank all our teaching and non-teaching staff members of the
Computer Science department for their passionate support, for
helping us to identify our flaws and also for the appreciation they gave
us in achieving our goal. Also, we would like to record our deepest
gratitude to our parents for their constant encouragement.
ABSTRACT
An intrusion detection system (IDS) is a critical component of modern network
security. It is designed to monitor network traffic and identify potential security
threats, including unauthorized access, misuse, or other malicious activities.
IDSs work by analysing network traffic and comparing it against a database of
known attack signatures or behaviour patterns. They can be deployed at various
points in a network and can generate alerts or take automated actions to respond
to threats. There are two main types of IDSs: signature-based and behaviour-
based. Signature-based IDSs use a database of known attack patterns to identify
threats, while behaviour-based IDSs use machine learning and other techniques
to analyse network traffic and detect anomalies. IDSs can be deployed as
standalone appliances or integrated into existing security architectures to
provide real-time threat intelligence and response capabilities. IDSs are essential
tools for protecting networks from a wide range of threats, including malware
infections, network breaches, and insider attacks. However, they can also
generate false positives, which can be time-consuming to investigate, and they
require ongoing maintenance and updates to remain effective against evolving
threats. Regular testing and evaluation of the IDS is important to ensure it is
providing adequate protection against emerging threats. In addition to
generating alerts, IDSs can also take automated actions to respond to threats.
However, these automated responses should be carefully configured and tested
to avoid disrupting legitimate traffic or causing other unintended consequences.