dc.contributor.author |
Shaon, Md. Shahriar Parvez |
|
dc.date.accessioned |
2024-09-12T06:47:23Z |
|
dc.date.available |
2024-09-12T06:47:23Z |
|
dc.date.issued |
2024-01-24 |
|
dc.identifier.uri |
http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/13401 |
|
dc.description.abstract |
The rapid growth of interconnected digital device and the advancement of technology,
the data security become an issue now a days. This leads various type of cyberattacks. In
order to detect and effectively analyze malicious activities in a system or network, the
implementation of an intrusion detection system is needed. It’s a system in a form of
hardware or software that searches the network system for unusual behavior. Intrusion
detection becomes paramount in ensuring network security as computer becoming more
interconnected. Therefore, intrusion detection systems actively monitor the traffic of
computers on the network to detect and alert to threats or malicious activities. In this
study I develop intelligent detection system that can detect intrusion using various
machine learning technique. I also use different metrics to evaluate the effectiveness of
our solutions and make comparisons to determine the best intrusion detection network.
Results from various studies were carefully analyzed and compared; this provided insight
and direction for future work in this area. Data breaches often lead to unauthorized access
to, alteration or deletion of sensitive data, leading to privacy and confidentiality issues.
This can impact service because denial of service can cause outages and prevent
important operations. The consequences of such incidents can be devastating, including
security breaches and legal and financial damages to the organization's reputation |
en_US |
dc.publisher |
Daffodil International University |
en_US |
dc.subject |
Machine Learning |
en_US |
dc.subject |
Intrusion Detection |
en_US |
dc.subject |
Cybersecurity |
en_US |
dc.subject |
Intrusion Detection System (IDS) |
en_US |
dc.title |
A machine learning approach to detect intrusion |
en_US |
dc.type |
Other |
en_US |