0% found this document useful (0 votes)
91 views17 pages

Intrusion Detection Systems Guide

This document is a technical presentation on Intrusion Detection Systems submitted for a Bachelor's degree. It includes an abstract, introduction, evolution of IDS, key concepts, architecture, types of IDS including host-based, network-based and application-based. It also discusses IDS techniques like signature detection, anomaly detection and proposes a banking scenario example. The advantages and disadvantages of IDS are outlined and references are provided.

Uploaded by

Keerthan Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views17 pages

Intrusion Detection Systems Guide

This document is a technical presentation on Intrusion Detection Systems submitted for a Bachelor's degree. It includes an abstract, introduction, evolution of IDS, key concepts, architecture, types of IDS including host-based, network-based and application-based. It also discusses IDS techniques like signature detection, anomaly detection and proposes a banking scenario example. The advantages and disadvantages of IDS are outlined and references are provided.

Uploaded by

Keerthan Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1

VISVESVARAYA TECHNOLOGICAL UNIVERSITY JNANA SANGAMA,


BELAGAVI – 590018

Mysuru Royal Institute of Technology, Mandya


A Technical Presentation On

INTRUSION DETECTION SYSTEM


submitted in partial fulfillment for the award of degree of

BACHELOR OF ENGINEERING IN COMPUTER SCIENCE AND ENGINEERING

Under the guidance of: Presented by:

Mrs. SOUMYA B. YASHASWINI V.E.

Asst. Prof, Dept. of CSE 4MU15CS086


 Abstract 2
CONTENTS
 Introduction
 Evolution
 Key Concepts
 Architecture of IDS
 Types of IDS
 IDS Techniques
 Advantage &
Disadvantage
 Conclusion
 References
3
ABSTRACT
 Security of any organization is the primary concern
nowadays.
 internal intrusion is the big problem .
 Tracking this user becomes really difficult for firewall
because it is mainly focused on the attack happening
through other network.
 To detect this attack anomaly based detection
methods.
 Anomaly based method creates the image of
behaviour of each user and if user does activities
which are not in that image of behaviour it is
considered as a malicious activity and threat to the
system.
4
INTRODUCTION
 Fast technology growth has given rise to new
vulnerabilities and threats to the mechanization era.
 Threats and attacks are getting a lot of frequent and
should be handled in an exceedingly a lot of
economical and effective manner.
 Intrusion Detection System (IDS) is meant to be a
software application which monitors the network or
system activities and finds if any malicious operations
occurs.
 IDS offer a layer of defence before typical security
technique equivalent to authentication and access
management.
5
EVOLUTION
 A computer system should provide confidentiality, integrity
and assurance against denial of service. However, due to
increased connectivity (especially on the Internet), and the
vast spectrum of financial possibilities that are opening up,
more and more systems are subject to attack by intruders.
So IDS come in to existence.IDS provides all facilities to
protect your system.
 Intrusion Detection (ID) defined : Process of monitoring
computer networks and systems for violations of security
policy First ID System--manual “system audits” 1980, ID was
born Government sponsored development in early 1980’s.
 First ID systems for Air Force and Navy.
 First document need for automated audit trail review to
support security goals. As the Growth of Internet force IDS to
be developed. Commercial ID systems began appearing in
early 1990’s
6
KEY CONCEPTS
The functionalities include:
• Data collection
• Feature Selection
• Analysis
• Action

The phases of life cycle are:


• Evaluation
• Deployment
• Operation
• Maintenance
7
ARCHITECTURE OF IDS
TYPES 8

OF IDS

1. Host based IDS


2. Network based IDS
3. Application based IDS
9
IDS ALGORITHM
10
PROPOSED
SYSTEM:BANKING SCENARIO
 We want the network log data that contain the all information like the
transaction, the status of intrusion.
 Then we upload that data to system to detect the percentage of
intrusion and generate the report.
 Many time the inner person attack on system through network then we
can’t find that some attack happen on network. But use of ids we can
detect any inner and outer attacks from network.
 This System is introduced to maximize the effectiveness in identifying
attacks and achieve high accuracy rate.
 The proposed assemblage is introduced to maximize the effectiveness
in identifying attacks and achieve high accuracy rate as well as low
false alarm rate.
11
IDS TECHNIQUES

 Now that we have examined the two basic types of IDS


and why they should be used together, we can investigate
how they go about doing their job. For each of the two
types, there are two basic techniques used to detect
intruders:
 Misuse detection (Signature detection or Pattern
Detection).
 Anomaly detection (Behavior detection)
12
SIGNATURE
DETECTION SYSTEM
ANOMALY 13

DETECTION SYSTEM
14
ADVANTAGES &
DISADVANTAGES

 Often intrusion detection systems often produce false


report of malicious activity. Sometimes this makes the
real malicious activity ignored.
 One of the key features of most intrusion detection
system is they operate upon packets which are
encrypted. These encrypted packets are complicated
for analysis.
15
CONCLUSION
 Model consists of huge datasets with distributed surroundings that
improves the performance of Intrusion detection system.
 The projected approach is additionally being tested with the KDD
datasets.
 IDS system takes less execution time and storage to check the dataset.
 the projected work is presumably used for varied distance computation
perform between the trained model and testing knowledge.
 The performance of proposed IDS is better than that of other approaches
and can significantly detect almost all anomaly data in the computer
network.
 In future, the system can be made more intelligent that it will distinguish
which is active and passive attack on the system
16
REFERENCES

• http://airccse.org/journal/ijsptm/papers/4115ijsptm04.pdf.
• https://www.researchgate.net/publication/316599266_INTR
USION_DETECTION_SYSTEM
• International Research Journal of Engineering and
Technology (IRJET) - 2018
17

You might also like