Version: 1.0.1
This project is a Network Intrusion Detection System (IDS) designed to monitor incoming and outgoing network packets in real-time. It detects and logs suspicious activity, such as TCP SYN packets, which are often indicative of port scanning or DoS attacks.
The system is implemented in C++ and uses Npcap for packet capturing. It is a powerful tool for analyzing network traffic and enhancing cybersecurity defenses.
- Real-Time Packet Monitoring: Captures and analyzes live network traffic with precision and speed.
- Intrusion Detection: Advanced detection of specific packet types, focusing on potential security threats like TCP SYN packets.
- Platform Compatibility: Windows-based solution, developed using cutting-edge tools like
Npcap
andCLion
. - Intuitive CLI Interface: Simple and user-friendly command-line experience for seamless interaction.
Note: Actual screenshot paths need to be replaced with your repository's image links
-
Initial Screen – Scanning Devices
Before starting packet capture, the system scans available network interfaces.
-
Packet Transmission from Python
Packets are sent using a Python script, simulating SYN packet activity.
-
Detected Packets in IDS
The IDS logs the detected SYN packets in real time.
- Windows OS
- CLion IDE
- Npcap
- CMake
- Python (for testing)
-
Clone the repository:
git clone https://github.com/scrollDynasty/Intrusion_Detection_System_IDS.git cd Intrusion_Detection_System_IDS
-
Install Npcap:
- Download and install the latest version from Npcap Official Website
- Ensure it is installed in
D:/projects/Intrusion_Detection_System_IDS/npcap
-
Configure the build using CMake:
cmake -S . -B build cmake --build build
-
Run the executable:
./build/Intrusion_Detection_System_IDS.exe
-
(Optional) Use the Python script for testing:
from scapy.all import * target_ip = "192.168.1.100" # Replace with IDS machine IP packet = IP(dst=target_ip)/TCP(dport=80, flags="S") send(packet, count=100)
- Launch the IDS: Run the executable file. The system will scan and list available network interfaces.
- Select Interface: Enter the interface number where you want to monitor traffic.
- Start Monitoring: The system will begin monitoring packets and display detected SYN packets in real-time.
- Test Detection: Use the provided Python script to send packets and verify IDS detection.
- Add support for additional network protocols
- Implement advanced alert notifications for suspicious activities
- Enhance the user interface with a graphical dashboard
- Integrate machine learning for more intelligent threat detection
This project is licensed under the MIT License. See the LICENSE file for details.
Have questions or feedback? Feel free to reach out!
- Email: ymarumar502@gmail.com
- GitHub: scrollDynasty
Contributions are welcome! 🌟 Please read the contributing guidelines before getting started.