Interaction The most common and sophisticated kind of attacks occurring globally are cyber-attacks. Work from Home is the main source of income in the post-pandemic society. As a result, the rate of intrusion detection rises quickly. As a result, it is necessary to outline the growing difficulties in identifying intrusions. Degradation of security services, such as data integration, availability, confidentiality, and integrity, could result from a failure to identify the breaches. It is necessary to develop and put into practice an effective model to break the chain in order to combat incursions and stop attacks. The system was divided into two systems by computer security. The primary focus of this work is on one of its techniques for creating an accurate and efficient model to identify intrusions seen in the video data. Additionally, it displays a comparative table with taxonomy that explains which machine learning technique is most appropriate and useful for producing accurate results. The security of computer security is increased by these methods. An intrusion detection system's primary objective is to identify intrusions more quickly and effectively. Early detection of an intrusion is usually preferable to a more problematic stage. In this study, we extract the incursions from the video data using six machine learning algorithms. Every single strategy is effective against a certain attack. Large datasets that are classified using ensemble methods and trained using specific algorithms are ideal for anomaly identification.