1
VISVESVARAYA TECHNOLOGICAL UNIVERSITY JNANA SANGAMA,
BELAGAVI – 590018
Mysuru Royal Institute of Technology, Mandya
A Technical Presentation On
INTRUSION DETECTION SYSTEM
submitted in partial fulfillment for the award of degree of
BACHELOR OF ENGINEERING IN COMPUTER SCIENCE AND ENGINEERING
Under the guidance of: Presented by:
Mrs. SOUMYA B. YASHASWINI V.E.
Asst. Prof, Dept. of CSE 4MU15CS086
Abstract 2
CONTENTS
Introduction
Evolution
Key Concepts
Architecture of IDS
Types of IDS
IDS Techniques
Advantage &
Disadvantage
Conclusion
References
3
ABSTRACT
Security of any organization is the primary concern
nowadays.
internal intrusion is the big problem .
Tracking this user becomes really difficult for firewall
because it is mainly focused on the attack happening
through other network.
To detect this attack anomaly based detection
methods.
Anomaly based method creates the image of
behaviour of each user and if user does activities
which are not in that image of behaviour it is
considered as a malicious activity and threat to the
system.
4
INTRODUCTION
Fast technology growth has given rise to new
vulnerabilities and threats to the mechanization era.
Threats and attacks are getting a lot of frequent and
should be handled in an exceedingly a lot of
economical and effective manner.
Intrusion Detection System (IDS) is meant to be a
software application which monitors the network or
system activities and finds if any malicious operations
occurs.
IDS offer a layer of defence before typical security
technique equivalent to authentication and access
management.
5
EVOLUTION
A computer system should provide confidentiality, integrity
and assurance against denial of service. However, due to
increased connectivity (especially on the Internet), and the
vast spectrum of financial possibilities that are opening up,
more and more systems are subject to attack by intruders.
So IDS come in to existence.IDS provides all facilities to
protect your system.
Intrusion Detection (ID) defined : Process of monitoring
computer networks and systems for violations of security
policy First ID System--manual “system audits” 1980, ID was
born Government sponsored development in early 1980’s.
First ID systems for Air Force and Navy.
First document need for automated audit trail review to
support security goals. As the Growth of Internet force IDS to
be developed. Commercial ID systems began appearing in
early 1990’s
6
KEY CONCEPTS
The functionalities include:
• Data collection
• Feature Selection
• Analysis
• Action
The phases of life cycle are:
• Evaluation
• Deployment
• Operation
• Maintenance
7
ARCHITECTURE OF IDS
TYPES 8
OF IDS
1. Host based IDS
2. Network based IDS
3. Application based IDS
9
IDS ALGORITHM
10
PROPOSED
SYSTEM:BANKING SCENARIO
We want the network log data that contain the all information like the
transaction, the status of intrusion.
Then we upload that data to system to detect the percentage of
intrusion and generate the report.
Many time the inner person attack on system through network then we
can’t find that some attack happen on network. But use of ids we can
detect any inner and outer attacks from network.
This System is introduced to maximize the effectiveness in identifying
attacks and achieve high accuracy rate.
The proposed assemblage is introduced to maximize the effectiveness
in identifying attacks and achieve high accuracy rate as well as low
false alarm rate.
11
IDS TECHNIQUES
Now that we have examined the two basic types of IDS
and why they should be used together, we can investigate
how they go about doing their job. For each of the two
types, there are two basic techniques used to detect
intruders:
Misuse detection (Signature detection or Pattern
Detection).
Anomaly detection (Behavior detection)
12
SIGNATURE
DETECTION SYSTEM
ANOMALY 13
DETECTION SYSTEM
14
ADVANTAGES &
DISADVANTAGES
Often intrusion detection systems often produce false
report of malicious activity. Sometimes this makes the
real malicious activity ignored.
One of the key features of most intrusion detection
system is they operate upon packets which are
encrypted. These encrypted packets are complicated
for analysis.
15
CONCLUSION
Model consists of huge datasets with distributed surroundings that
improves the performance of Intrusion detection system.
The projected approach is additionally being tested with the KDD
datasets.
IDS system takes less execution time and storage to check the dataset.
the projected work is presumably used for varied distance computation
perform between the trained model and testing knowledge.
The performance of proposed IDS is better than that of other approaches
and can significantly detect almost all anomaly data in the computer
network.
In future, the system can be made more intelligent that it will distinguish
which is active and passive attack on the system
16
REFERENCES
• http://airccse.org/journal/ijsptm/papers/4115ijsptm04.pdf.
• https://www.researchgate.net/publication/316599266_INTR
USION_DETECTION_SYSTEM
• International Research Journal of Engineering and
Technology (IRJET) - 2018
17