Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

Design and Implementation of Network Security Attack Detection System Using Data Mining Techniques

Services and capabilities become computerized with the advancement in the technology, and an ever-increasing amount of business is conducted electronically. As a result of this advancement in technology, the threat of network security-attacks increases. We will detect network security attacks throug

Project Title

Design and Implementation of Network Security Attack Detection System Using Data Mining Techniques

Project Area of Specialization

Cyber Security

Project Summary

Services and capabilities become computerized with the advancement in the technology, and an ever-increasing amount of business is conducted electronically. As a result of this advancement in technology, the threat of network security-attacks increases. We will detect network security attacks through data mining techniques to learn the patterns in the network data and to detect the possible attacks in the network traffic. We will analyze different algorithms (e.g. SVM, K-means, Naïve Bayes, clustering, regression and CNN etc.) and will implement the best algorithm for network attack detection. 

Project Objectives

The new techniques in technology is introducing day by day with so new methods are adopted by attackers which result in great damage to networks. Our focus is to find out the preeminent technique in data mining for network security attack detection. In our project we will scrutinize the existing data mining algorithms for network attacks detection and implement the best algorithm for network security attack detection.

Project Implementation Method

In implementation we design a system which will detect network security attacks. We will implement the best identified algorithm in our system for detection. The system is trained which monitors the ongoing network activities and network traffic. The malicious and unauthorized activity is mapped on the system. The detected threats and their categories are enlisted. The modules are coded for the automation processes in system.

Benefits of the Project

  • Monitor and evaluate threats, catch intruders and take action in real time.
  • Maintain the privacy of users 
  • Detects and stops attacks.
  • Monitor a network for malicious activity , policy violations from unauthorized users.
  • Ability to deal with different types of attributes/ attacks.
  • System will identify threats and suspicious activities.

System will warn (notification to user or admin) when such behavior is detected.

Technical Details of Final Deliverable

System will be placed centrally to capture all the incoming packets that are transmitted over the network. Data will be  collect and send for pre-processing to remove the noise, irrelevant and missing attributes that are replaced. Then the pre-processed data will be analyzed and classified according to their severity measures. If the record is normal, then it does not require any more change or else it will be send for report generation to raise alarms. Based on the state of the data, alarms will be raised to make the administrator to handle the situation in advance. The attack is modeled so as to enable the classification of network data. All the above process will be continues as soon as the transmission starts.

Final Deliverable of the Project

Software System

Core Industry

Security

Other Industries

Education , IT , Legal , Others

Core Technology

Big Data

Other Technologies

Others

Sustainable Development Goals

Quality Education, Decent Work and Economic Growth, Industry, Innovation and Infrastructure, Peace and Justice Strong Institutions

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
NIC cards Equipment225005000
Stationary Miscellaneous 102002000
Printing Miscellaneous 250102500
Others Miscellaneous 102502500
Total in (Rs) 12000
If you need this project, please contact me on contact@adikhanofficial.com
Autonomous Self Balancing trolley for hospitals

e>In today's era, robots have taken the place of human beings and now robots are used at t...

1675638330.png
Adil Khan
9 months ago
Performance Improvement of Solar (PV) Array Topologies During Various...

INTRODUCTION:                  >>The ou...

1675638330.png
Adil Khan
9 months ago
Development and automation of piezoelectric gripper for micro manipula...

Piezoelectric bimorphs have been used as a micro-gripper in many applications, but the sys...

1675638330.png
Adil Khan
9 months ago
Sign Languages to Learn Quran For Deaf Person

It was estimated 2.5% of the population is disabled out which 7.5% are deaf. A friend who...

1675638330.png
Adil Khan
9 months ago
voice recogniton based smart blind stick

The aim of smart stick is to provide efficient navigation aid for the blind persons which...

1675638330.png
Adil Khan
9 months ago