0% found this document useful (0 votes)
25 views4 pages

Moha's Project

Uploaded by

kenabadane0938
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

Moha's Project

Uploaded by

kenabadane0938
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

WERABE UNIVERSITY

INSTITUTE OF TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY

A
Seminar
Report On
Intrusion Detection System

BY MOHAMMED AHMED

WERABE, Ethiopia (Sep, 2024)


INTRODUCTION TO IDS
An Intrusion Detection System (IDS) is a security tool that monitors a computer network or
systems for malicious activities or policy violations. It helps detect unauthorized access,
potential threats, and abnormal activities by analysing traffic and alerting administrators to
take action. An IDS is crucial for maintaining network security and protecting sensitive data
from cyber-attacks.
An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity
and sends alerts when it occurs. The main duties of an Intrusion Detection System (IDS)
are anomaly detection and reporting, however, certain Intrusion Detection Systems can
take action when malicious activity or unusual traffic is discovered. In this article, we will
discuss every point about the Intrusion Detection System.

1.1 What is an Intrusion Detection System?


A system called an intrusion detection system (IDS) observes network traffic for malicious
transactions and sends immediate alerts when it is observed. It is software that checks a
network or system for malicious activities or policy violations. Each illegal activity or
violation is often recorded either centrally using an SIEM system or notified to an
administration. IDS monitor a network or system for malicious activity and protect a
computer network from unauthorized access from users, including perhaps insiders. The
intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of
distinguishing between ‘bad connections’ (intrusion/attacks) and ‘good (normal)
connections’.

You might also like