0% found this document useful (0 votes)
228 views7 pages

Intrusion Detection System (Ids)

An intrusion detection system (IDS) monitors network traffic and system activities for signs of threats and attacks. It analyzes network packets and traffic to detect vulnerabilities, exploits, and malicious activity. The document proposes developing an IDS for wireless networks that uses time series analysis techniques to detect intrusions in real-time, inform users of attacks, track policy violations, respond to attacks, and store event logs. The researcher acknowledges limitations in fully understanding IDS functionality and improving the system.

Uploaded by

Tulasi Nathan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views7 pages

Intrusion Detection System (Ids)

An intrusion detection system (IDS) monitors network traffic and system activities for signs of threats and attacks. It analyzes network packets and traffic to detect vulnerabilities, exploits, and malicious activity. The document proposes developing an IDS for wireless networks that uses time series analysis techniques to detect intrusions in real-time, inform users of attacks, track policy violations, respond to attacks, and store event logs. The researcher acknowledges limitations in fully understanding IDS functionality and improving the system.

Uploaded by

Tulasi Nathan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

INTRUSION DETECTION

SYSTEM (IDS)
TULASINATAN A/L MUTHUALAGU (TP026049)

Introduction

An Intrusion Detection System (IDS) is a


network security technology originally built for
detecting vulnerability exploits against a target
application or computer.

Intrusion Detection System will keeps an eye on


packets on a network wire to find whether the
hacker is breaking into your system.

It analyzes the traffic on your network to


monitor signs of different malicious activity.

Problem Statement

Receives malicious activity from the hacker such as attacks and


mappings

Packets on network wire and the traffic is not secure.

vulnerability exploits against a target application or a computer

Low level detection of intrusion attacks.

Aim & Objective

Aim

To implement an Intrusion Detection System for wireless network


to detect and monitoring malicious activities by using time series
analysis techniques.

Objectives

To develop an application to detectssecurity threatsand attacks as


and when they happen by providing real-time network monitoring
and analysing both user and system activities

To develop an application that detects an attack, then it put


forward information about the attack.

To develop an application that tracking user policy violations.

To develop an application for the active systems also take measure


to tackle the attack and ability to recognize patterns typical of
attacks.

To develop an application stores the events either locally or


otherwise in case of an attack.

Personal Reflection

There are some limitation and difficulties to the researcher while doing
this research proposal.

comprehend how the Intrusion Detection System is works, and what are
method can be implemented by the researcher to upgrade the system in
thisproject.

THANK YOU

You might also like