SlideShare a Scribd company logo
Base paper Title: A Measurement Approach for Inline Intrusion Detection of Heartbleed-Like
Attacks in IoT Frameworks
Modified Title: A Measuring Method for Inline Intrusion Detection of Attacks Similar to
Heartbleed in Internet of Things Frameworks
Abstract
Cyber security is one of the most crucial aspects of the Internet of Things (IoT). Among
the possible threats, great interest is today paid toward the possible capturing of information
caused by external attacks on both client and server sides. Whatever the IoT application, the
involved nodes are exposed to cyberattacks mainly through the vulnerability of either the
sensor nodes themselves (if they have the capabilities for networking operativity) or the IoT
gateways, which are the devices able to create the link between the local nodes of the IoT
network, and the wide area networks. Due to the low-cost constraints typical of many IoT
applications, the IoT sensor nodes and IoT gateways are often developed on low-performance
processing units, in many cases customized for the specific application, and thus not easy to
update against new cyber threats that are continuously identified. In the framework of
cyberattacks aimed at capturing sensitive information, one of the most known was the
heartbleed, which, has allowed attackers to remotely read protected memory from an estimated
24%–55% of popular HTTPS sites. To overcome such a problem, which was due to a bug of
the OpenSSL, a suitable patch was quickly released, thus allowing to avoid the problem in most
of the cases. However, IoT devices may require more advanced mitigation techniques, because
they are sometimes unable to be patched for several practical reasons. In this scenario, the
article proposes a novel measurement method for inline detecting intrusions due to heartbleed
and heartbleed-like attacks. The proposed solution is based on an effective rule which does not
require decoding the payload and that can be implemented on a lowperformance general-
purpose processing unit. Therefore, it can be straightforwardly implemented and included in
either IoT sensor nodes or IoT gateways. The realized system has been tested and validated on
a number of experiments carried out on a real network, showing performance comparable (in
some cases better) with the heavier machine learning-based methods.
Existing System
N ETWORK security monitoring and measurements are commonly used methodologies in information
security operation centers. The network traffic is captured by means of suitable measurement probes
and the related logs are monitored to detect any illegal activities within the network [1], [2]. Intrusion
detection systems (IDSs) are automatic systems specifically designed for identifying threats that are
able to potentially create damage to information systems as data leakages, Distributed Denial of
Service (DDoS), Bad Data Injection, to cite a few, and in different contexts of application [3], [4], [5],
[6], [7]. Recent trends of cyberattacks go toward Internet of Things (IoT) and operational technology
(OT) infrastructure which will involve more and more targets including critical infrastructures,
traditional manufacturing facilities, even smart home networks, in the next years. Due to the
prevalence of employees managing these systems via remote access, which provides a very good entry
point for cybercriminals, it is expected that attackers will target industrial sensors to cause physical
damage that could result in assembly lines shutting down or services being interrupted [8].
Drawback in Existing System
 Complexity: Implementing a measurement approach for inline intrusion detection can
be complex and time-consuming. It requires expertise and knowledge of network
protocols, intrusion detection systems, and measurement techniques. This complexity
can increase the chances of errors and mistakes during the implementation phase.
 Resource-intensive: Inline intrusion detection requires significant computing resources
and network bandwidth to perform real-time analysis and detection of malicious
activities. This can lead to higher operational costs and the need for specialized
hardware infrastructure to handle the increased load.
 False positives and negatives: Measurement approaches for inline intrusion detection
may produce false positives, i.e., identify legitimate traffic as malicious, or false
negatives, i.e., fail to detect actual intrusions. These inaccuracies can impact the overall
effectiveness and reliability of the intrusion detection system.
 Privacy concerns: Inline intrusion detection relies on inspecting and analyzing network
traffic in real-time, which can pose privacy concerns. This approach requires
monitoring and inspecting the content of network packets, potentially exposing
sensitive and confidential information to the intrusion detection system.
Proposed System
 The proposed approach is widely applicable to protect heart bleed but also other attacks
dealing with data breach.
 Proposed results and methodology allow discussing about the possible extension of the
work in more general and complex frameworks of Cyber Security, by analzing both the
level of generalization and the likelihood of the considered kind of attacks.
 we proposed a flowby-flow evaluation of the parameters of interest for developing the
rules described in the following. In other words, considering the parameters measured
by CICFlowMeter at each flow, they are used for evaluating the involved quantities.
 As for the proposed rule-based approach, it has shown a very good performance,
comparable with DT and RF, in terms of precision and specificity and a little bit worse,
but better than the other considered ML algorithms, in terms of accuracy, sensitivity,
and F1–score.
Algorithm
 In fact, it has shown an execution time that is more than 5 times shorter than that
experienced when the Decision Tree algorithm has been considered.
 Analyzing these results, it is possible to note that the ML algorithms that have shown
the better performance are Random
 Performance comparison among the above–mentioned ML algorithms
Advantages
 Real-time detection: The measurement approach allows for real-time detection of
intrusions as it operates directly in the communication path of the data [1]. This
means that any incoming traffic can be analyzed and checked for security threats
immediately.
 By being inline, the measurement approach provides granular visibility into the
network traffic. It can capture and analyze each packet of data, allowing for detailed
inspection and detection of potential intrusions
 The measurement approach utilizes statistical anomaly-based detection, which
compares incoming traffic against a predetermined baseline of normal behaviour. This
enables accurate detection of deviations from normal patterns, which may indicate an
intrusion
 In addition to anomaly detection, the measurement approach can also incorporate
signature-based detection. By maintaining a database of known code exploits, it can
quickly identify and eliminate known threats
Software Specification
 Processor : I3 core processor
 Ram : 4 GB
 Hard disk : 500 GB
Software Specification
 Operating System : Windows 10 /11
 Frond End : Python
 Back End : Mysql Server
 IDE Tools : Pycharm

More Related Content

PDF
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
 
PDF
Es34887891
IJERA Editor
 
DOCX
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
 
DOC
06686259 20140405 205404
Manasa Deshaboina
 
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
PDF
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IJNSA Journal
 
PDF
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
 
PDF
Comparative Analysis: Network Forensic Systems
ijsrd.com
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
 
Es34887891
IJERA Editor
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
 
06686259 20140405 205404
Manasa Deshaboina
 
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IJNSA Journal
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
 
Comparative Analysis: Network Forensic Systems
ijsrd.com
 

Similar to A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Attacks_in_IoT_Frameworks.docx (20)

PDF
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
PDF
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 
PDF
Intrusion detection system via fuzzy
IJDKP
 
PDF
F0371046050
inventionjournals
 
PDF
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
 
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
PDF
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ijsptm1
 
PDF
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
ijsptm
 
PDF
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ClaraZara1
 
PDF
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
 
PDF
Intrusion Detection Systems By Anamoly-Based Using Neural Network
IOSR Journals
 
PDF
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
PDF
Ii2514901494
IJERA Editor
 
PDF
Ijnsa050214
IJNSA Journal
 
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
PDF
A NOVEL HEADER MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS
IJNSA Journal
 
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
IRJET Journal
 
PDF
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
IJNSA Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 
Intrusion detection system via fuzzy
IJDKP
 
F0371046050
inventionjournals
 
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ijsptm1
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ClaraZara1
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
IOSR Journals
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
Ii2514901494
IJERA Editor
 
Ijnsa050214
IJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
A NOVEL HEADER MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS
IJNSA Journal
 
Intrusion Detection System using AI and Machine Learning Algorithm
IRJET Journal
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
IJNSA Journal
 
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
DOCX
A Novel Framework for Credit Card.
Shakas Technologies
 
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
DOCX
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
DOCX
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 
Ad

Recently uploaded (20)

PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Basics and rules of probability with real-life uses
ravatkaran694
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 

A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Attacks_in_IoT_Frameworks.docx

  • 1. Base paper Title: A Measurement Approach for Inline Intrusion Detection of Heartbleed-Like Attacks in IoT Frameworks Modified Title: A Measuring Method for Inline Intrusion Detection of Attacks Similar to Heartbleed in Internet of Things Frameworks Abstract Cyber security is one of the most crucial aspects of the Internet of Things (IoT). Among the possible threats, great interest is today paid toward the possible capturing of information caused by external attacks on both client and server sides. Whatever the IoT application, the involved nodes are exposed to cyberattacks mainly through the vulnerability of either the sensor nodes themselves (if they have the capabilities for networking operativity) or the IoT gateways, which are the devices able to create the link between the local nodes of the IoT network, and the wide area networks. Due to the low-cost constraints typical of many IoT applications, the IoT sensor nodes and IoT gateways are often developed on low-performance processing units, in many cases customized for the specific application, and thus not easy to update against new cyber threats that are continuously identified. In the framework of cyberattacks aimed at capturing sensitive information, one of the most known was the heartbleed, which, has allowed attackers to remotely read protected memory from an estimated 24%–55% of popular HTTPS sites. To overcome such a problem, which was due to a bug of the OpenSSL, a suitable patch was quickly released, thus allowing to avoid the problem in most of the cases. However, IoT devices may require more advanced mitigation techniques, because they are sometimes unable to be patched for several practical reasons. In this scenario, the article proposes a novel measurement method for inline detecting intrusions due to heartbleed and heartbleed-like attacks. The proposed solution is based on an effective rule which does not require decoding the payload and that can be implemented on a lowperformance general- purpose processing unit. Therefore, it can be straightforwardly implemented and included in either IoT sensor nodes or IoT gateways. The realized system has been tested and validated on a number of experiments carried out on a real network, showing performance comparable (in some cases better) with the heavier machine learning-based methods. Existing System
  • 2. N ETWORK security monitoring and measurements are commonly used methodologies in information security operation centers. The network traffic is captured by means of suitable measurement probes and the related logs are monitored to detect any illegal activities within the network [1], [2]. Intrusion detection systems (IDSs) are automatic systems specifically designed for identifying threats that are able to potentially create damage to information systems as data leakages, Distributed Denial of Service (DDoS), Bad Data Injection, to cite a few, and in different contexts of application [3], [4], [5], [6], [7]. Recent trends of cyberattacks go toward Internet of Things (IoT) and operational technology (OT) infrastructure which will involve more and more targets including critical infrastructures, traditional manufacturing facilities, even smart home networks, in the next years. Due to the prevalence of employees managing these systems via remote access, which provides a very good entry point for cybercriminals, it is expected that attackers will target industrial sensors to cause physical damage that could result in assembly lines shutting down or services being interrupted [8]. Drawback in Existing System  Complexity: Implementing a measurement approach for inline intrusion detection can be complex and time-consuming. It requires expertise and knowledge of network protocols, intrusion detection systems, and measurement techniques. This complexity can increase the chances of errors and mistakes during the implementation phase.  Resource-intensive: Inline intrusion detection requires significant computing resources and network bandwidth to perform real-time analysis and detection of malicious activities. This can lead to higher operational costs and the need for specialized hardware infrastructure to handle the increased load.  False positives and negatives: Measurement approaches for inline intrusion detection may produce false positives, i.e., identify legitimate traffic as malicious, or false negatives, i.e., fail to detect actual intrusions. These inaccuracies can impact the overall effectiveness and reliability of the intrusion detection system.  Privacy concerns: Inline intrusion detection relies on inspecting and analyzing network traffic in real-time, which can pose privacy concerns. This approach requires monitoring and inspecting the content of network packets, potentially exposing sensitive and confidential information to the intrusion detection system. Proposed System
  • 3.  The proposed approach is widely applicable to protect heart bleed but also other attacks dealing with data breach.  Proposed results and methodology allow discussing about the possible extension of the work in more general and complex frameworks of Cyber Security, by analzing both the level of generalization and the likelihood of the considered kind of attacks.  we proposed a flowby-flow evaluation of the parameters of interest for developing the rules described in the following. In other words, considering the parameters measured by CICFlowMeter at each flow, they are used for evaluating the involved quantities.  As for the proposed rule-based approach, it has shown a very good performance, comparable with DT and RF, in terms of precision and specificity and a little bit worse, but better than the other considered ML algorithms, in terms of accuracy, sensitivity, and F1–score. Algorithm  In fact, it has shown an execution time that is more than 5 times shorter than that experienced when the Decision Tree algorithm has been considered.  Analyzing these results, it is possible to note that the ML algorithms that have shown the better performance are Random  Performance comparison among the above–mentioned ML algorithms Advantages  Real-time detection: The measurement approach allows for real-time detection of intrusions as it operates directly in the communication path of the data [1]. This means that any incoming traffic can be analyzed and checked for security threats immediately.  By being inline, the measurement approach provides granular visibility into the network traffic. It can capture and analyze each packet of data, allowing for detailed inspection and detection of potential intrusions  The measurement approach utilizes statistical anomaly-based detection, which compares incoming traffic against a predetermined baseline of normal behaviour. This enables accurate detection of deviations from normal patterns, which may indicate an intrusion  In addition to anomaly detection, the measurement approach can also incorporate signature-based detection. By maintaining a database of known code exploits, it can quickly identify and eliminate known threats
  • 4. Software Specification  Processor : I3 core processor  Ram : 4 GB  Hard disk : 500 GB Software Specification  Operating System : Windows 10 /11  Frond End : Python  Back End : Mysql Server  IDE Tools : Pycharm