Professional Documents
Culture Documents
Finalsynospi
Finalsynospi
PROJECT SYNOPSIS ON
DIPLOMA
In
COHORT OWNER
Mr. NAVEEN KUMAR V G BE, M.Tech
Lecturer Dept of CSE.
BGS POLYTECHNIC
Chikkaballapura
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BGS POLYTECHNIC [498]
(An ISO 9001:2015 Certified)
BGS (SJCIT) Campus, Chickballapura-562101
2023-2024
BGS POLYTECHNIC
SJCIT CAMPUS, B.B. ROAD, NH No. 7,
CHIKKABALLAPURA -562 101
CERTIFICATE
This is to Certify that the project synopsis entitled “A Novel
Intrusion Detection System for Internet of Healthcare Things
Based on Deep Subclasses Dispersion Information” is a bonafide
work carried out by KEERTHANA D M bearing Regno:
498CS21032 respectively in partial fulfillment for the award of
Degree of Diploma in Computer Science and Engineering of the
Board of Technical Education, Bangalore during the year 2023-2024.
It is certified that all the corrections, suggestions indicated for
internal assessment have been incorporated in the synopsis report
deposited in the Departmental library. The project synopsis report has been
approved as it satisfies the academic requirements in aspect of project work
prescribed for the Diploma in Computer Science and Engineering.
STUDENT DECLARATION
(iii) This project work does not contain other persons ‘data, pictures, graphs or other
information, unless specifically acknowledged as being sourced from other
persons
(iv) This project work does not contain other persons’ writing, unless specifically
acknowledged being sourced from other researchers where other written
sources have been quoted, then:
a) Their words have been rewritten but the general information attributed to
them has been referenced;
b) Where their exact words have been used, there writing has been placed
inside quotation marks, and referenced.
(v) This project work does not contain text, graphics or tables copied and pasted
from the internet, unless specifically acknowledged, and the source being
detailed in the thesis and in the reference’s sections.
STUDENT NAME REGISTER NO SIGNATURE
ACKNOWLEDGEMENT
Every project begins with an idea and materializes with concrete efforts. In the beginning, we
would like to thank the almighty God and our parents who gave us the strength and capability to
work on this project.
I thank our principal Prof. Mr. Y R MANJUNATH BE, M Tech for providing a congenial working
atmosphere.
Department, Computer Science and Engineering, for his consistent assistance and guidance
during the course of the project work.
We are extremely grateful to our project guide Mr. NAVEEN KUMAR V G B.E,M.Tech Lecturer
Department of Computer Science and Engineering for the guidance and encouragement.
I wish to thank to MY PARENTS and all MY FRIENDS who gave their valuable time and
ideas to complete this report.
Finally, we express our immense pleasure and thanks to all TEACHING STAFF and NON
TEACHING STAFF of the Department of Computer Science and Engineering, for their
cooperation and support.
ABSTRACT
Industrial Internet of Things (IIoT) represents the expansion of the Internet of
Things (IoT) in industrial sectors. It is designed to implicate embedded
technologies in manufacturing fields to enhance their operations. However, IIoT
involves some security vulnerabilities that are more damaging than those of IoT.
Accordingly, Intrusion Detection Systems (IDSs) have been developed to
forestall inevitable harmful intrusions. IDSs survey the environment to identify
intrusions in real time. This study designs an intrusion detection model exploiting
feature engineering and machine learning for IIoT security. We combine Isolation
Forest (IF) with Pearson’s Correlation Coefficient (PCC) to reduce computational
cost and prediction time. IF is exploited to detect and remove outliers from
datasets. We apply PCC to choose the most appropriate features. PCC and IF are
applied exchangeably (PCCIF and IFPCC). The Random Forest (RF) classifier is
implemented to enhance IDS performances. For evaluation, we use the Bot-IoT
and NF-UNSW-NB15-v2 datasets. RF-PCCIF and RF-IFPCC show noteworthy
results with 99.98% and 99.99% Accuracy (ACC) and 6.18 s and 6.25 s
prediction time on Bot-IoT, respectively. The two models also score 99.30% and
99.18% ACC and 6.71 s and 6.87 s prediction time on NF-UNSW-NB15-v2,
respectively.
TABLE OF CONTENTS
1 INTRODUCTION 1
2 LITERATURE SURVEY 2
3 EXISTING SYSTEM 3
4 PROPOSED SYSTEM 4
5 SYSTEM ARCHITECTURE 5
7 COST ESTIMATION 7
8 CONCLUSION 8
9 REFERENCES 9
INTRODUCTION
The Internet of Things (IoT) represents an extensive scale network of integrated
sensors and activators, serving a pertinent objective, and does not require human
intervention arbitration. Consequently, researchers suggest conventional tools to
support resolving these issues. In recent years, IoT technology has undergone
quick evolution. Subsequently, its security is a mandatory task to warrant several
services, such as confidentiality, privacy, data, and availability. Due to the
heterogeneous utilized protocols and data in IoT, implementing security
mechanisms is becoming challenging. Node quantity, low memory capability,
processing command, and energy consumption have severely compromised
security techniques. The Industrial Internet of Things (IIoT) denotes linking
devices, activators, and industrial systems to each. This technology gathers and
analyses data to improve the industrial sector proficiency.
LITERATURE SURVEY
Research Paper 1:
The IoHT has benefited the medical sector through remote monitoring of the
patient’s health status without any visits by him/her to the healthcare facility. This
resulted in time and cost savings, enhanced quality of healthcare services,
improved quality of patient’s health through better support and medication as
healthcare providers can effectively and accurately understand critical health
conditions, patients becoming well-informed about the improvements in their
health status and treatments, and increased patient interest and satisfaction through
simple and effective communication with healthcare providers.
Research Paper 2:
EXISTING SYSTEM
The IoT has created a connected network of devices that involves heterogeneous
objects from various aspects. While in the IoT, the network has no unified
protocols or standards. Therefore, it is challenging to allow full security measures
for those devices. While traditional security protocols provide optimal protection
for the IoT architecture against threats on the Internet. Thus, constructing an
efficient IDS relying on Deep Learning (DL) techniques and technologies is
promising. Research papers highlighted that applying novel DL techniques and
frameworks, besides enhancing the existing DL models, presents remarkable
results and strengthens the IDS performance. While it has an accurate and high
prediction rate, it can assist in the maintenance aspect of the IoT network.
Disadvantages:
PROPOSED SYSTEM:
We propose and validate a Network IDS (NIDS) model for IIoT security. In
our proposition, Isolation Forest (IF) is integrated to achieve outlier detection.
Pearson’s Correlation Coefficient (PCC) is also applied to choose the most
suitable features for dimensionality reduction. Then, Random Forest (RF)
distinguishes between normal packets and intrusions through binary
classification. The obtained results indicate that our model is promising when
it is compared with other previous related propositions. Our model depends on
the Bot-IoT dataset, known for its imbalance, and on the NFUNSW-NB15-v2
dataset. The strengths of our model appear in its capability to overtake the
imbalance of the Bot-IoT dataset, especially when we remove the outliers and
select the relevant features of the newly generated dataset.
Advantages:
SYSTEM ARCHITECTURE
REQUIREMENTS:
The following are the hardware and software requirements that have used to
implement the proposed system
Hardware Requirements
Software Requirement
COST ESTIMATION
2 HARDWARE 7000
4 TESTING 3000
TOTAL 25000
The proven efficiency of IDS has made it an essential tool, among others, to
mitigate IIoT vulnerabilities. In this study, we implement an IDS for IIoT
networks using the RF model for classification, PCC to select relevant features,
and IF as an outlier detector. We use PCC and IF separately and exchangeably. IF
takes the output of PCC as input and vice versa. Our model shows a great result in
overtaking the imbalance of the Bot-IoT dataset, which can be seen in the
confusion matrix of the RF-IFPCC model. On the NF-UNSW-NB15-v2 dataset,
the results are close to one another with outstanding performances. We intend in
our future work to exploit other datasets, such as the TON-IoT dataset containing
IoT and IIoT data, to have a global view and create and validate an effective IDS
for improving network security in general.