Research Backgrounds
Research Background
This project will be anomaly based, which
is an intrusion detection system for detecting both network and computer
intrusions and misuse by monitoring system activity and classifying it as
either if its normal or malicious intent. Intrusion detection system these days
has been too enhanced. Thus the user friendliness of existing IDS system now
are far too complicated for any young developers who plan to learn and study or
even use the existing IDS system as a simulation for the final year project.
These days, existing IDS all around the
world have commonly process 3 instructions which are to detect any intrusions
or malicious attack and then after on to alert
the head of security or the person/user in charge and then wait for them to
act, and lastly to adapt to the kind of malicious intent and prevent it from
ever happening again. Therefore, this projects minimizes and reduced the
actions of the IDS system and allows user to have lesser features to work and
understand on and start to learn the basic foundation of a normal intrusion
detection system. This system will be reducing certain features like being able
to have a machine learning feature which give the system the ability to learn
intrusion attack patterns and the complexity of interface. This project will be
focused on improving the learnability and user friendly of a IDS system
maximizing the ability to provide entrepreneurs, young or new developers and
even scientist an easier understand and the basic foundation of how normal IDS
system works.
PROBLEM STATEMENT
It is well known that anomaly-based IDS suffer from the
high rate of false alarms. Continuous efforts are being made to reduce the high
false positive rate. We believe that intrusion detection is a data analysis
process and can be studied as a problem of classifying data correctly. From
this standpoint, it can also be observed that any classification scheme is as
good as the data presented to it as input.
PROJECT SIGNIFICANT
With
the employment of this project on Intrusion detection system, it will improve
the stability any organization yet maintaining the ethic against any violation
of law. This will also provide companies to have their own free will of
protecting their confidential information that they would want to protect against
other competing companies.
Very well summarized and explained. 10/10
ReplyDeleteHopefully this will be implemented to reduce the high rate of false alarms
ReplyDeleteInteresting Facts!
ReplyDeleteVery innovative thinking and level headed though put into this
ReplyDelete