Real Time Network Intrusion Detection System Using Machine Learning
We are working to develop a real-time Network Intrusion Detection System using machine learning. Different tools are used to detect different types of malicious traffic. However, new attacks are invented at a high rate by just a small change in pre-existing malware. It is then required to ana
2025-06-28 16:28:54 - Adil Khan
Real Time Network Intrusion Detection System Using Machine Learning
Project Area of Specialization Artificial IntelligenceProject SummaryWe are working to develop a real-time Network Intrusion Detection System using machine learning.
Different tools are used to detect different types of malicious traffic. However, new attacks are invented at a high rate by just a small change in pre-existing malware. It is then required to analyze the signature of new malware to detect. A more general solution is needed that can detect and predict new malware. This is where Machine Learning (ML) becomes useful. An ML-model can be trained from a data-set with malicious and normal traffic. This model can then be used along CICflowmeter to detect new malicious traffic.
The aim of the project is to develop a system that protects the networks from any type of exploitation.
Project ObjectivesObjectives of the Project are:
- Research different kinds of malicious network traffic and preparing IDS data-sets
- Evaluating machine learning and deep learning algorithms for detecting different types of malicious traffic
- Capturing packets and generating flows in real-time using CICflowmeter
- Developing an interface for easy interaction.
- Integrating and testing in Real Environment.
- Analyzing and preprocess dataset.
- Analyze different Machine Learning and Deep Learning algorithms.
- Evaluate the performance and accuracy of different ML models.
- Building and testing prototype.
- Building desktop application.
- Testing of application in a real environment.
A modern approach to the real-world problems of network security. It will help the administrator to monitor network flow and get alerts for any type of intrusion.
It will also help the researchers to integrate their model and test in a real environment using this application.
Technical Details of Final DeliverableThe final deliverable will be a Linux based desktop application that will detect intrusion.
Final Deliverable of the Project Software SystemCore Industry SecurityOther Industries IT Core Technology Artificial Intelligence(AI)Other TechnologiesSustainable Development Goals Industry, Innovation and InfrastructureRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 28000 | |||
| Network broker | Equipment | 1 | 18000 | 18000 |
| Miscellaneous | Miscellaneous | 1 | 10000 | 10000 |