JOURNAL ARTICLE

Network Intrusion Monitoring System

Yash Phadatare

Year: 2025 Journal:   INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT Vol: 09 (03)Pages: 1-9

Abstract

This web application helps to identify an attack or sense abnormal behaviour in the network and send an alert to the user and protect the user. When the user login into the portal he gets the information about the network’s accuracy, f1-score, precision. This helps the user to detect how safe his network is for the system. Network intrusion detection systems (NIMS) play a critical role in safeguarding computer networks against various cyber threats. Traditional rule-based NIMS often struggle to keep pace with the evolving nature of attacks and the increasing complexity of network environments. In recent years, machine learning (ML) techniques have emerged as a promising approach to enhance the effectiveness of intrusion detection by enabling systems to learn and adapt to new threats. This paper presents an overview of the application of ML techniques in network intrusion detection. We discuss the challenges faced by traditional NIMS and highlight the advantages offered by ML-based approaches, including their ability to detect anomalies, classify network traffic, and adapt to changing attack patterns. We also provide a comprehensive survey of state-of- the-art ML algorithms commonly used in NIMS, such as deep learning, support vector machines, and ensemble methods. Keywords— web application, network intrusion detection, cyber threats, machine learning, anomalies, classification, deep learning.

Keywords:
Intrusion detection system Intrusion Computer science Computer security Geology

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.07
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Honeypots: Virtual Network Intrusion Monitoring System

Manmohan DagarRashmi Popli

Journal:   International Journal of Scientific Research in Network Security and Communication Year: 2018 Vol: 6 (2)Pages: 45-49
JOURNAL ARTICLE

MOCA: A Network Intrusion Monitoring and Classification System

Jessil FuhrFeng WangYongning Tang

Journal:   Journal of Cybersecurity and Privacy Year: 2022 Vol: 2 (3)Pages: 629-639
BOOK-CHAPTER

Network Intrusion Path of Power Monitoring System Based on Simulation System

Li FengKejie Zhao

Advances in intelligent systems and computing Year: 2020 Pages: 244-249
© 2026 ScienceGate Book Chapters — All rights reserved.