0% found this document useful (0 votes)
90 views12 pages

Intrusion Detection System Using Machine Learning

Uploaded by

sarthakrock.1353
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views12 pages

Intrusion Detection System Using Machine Learning

Uploaded by

sarthakrock.1353
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

INTRUSION DETECTION SYSTEM

USING MACHINE LEARNING


INTRODUCTION
 Intrusion : Attempting to break into or misuse
your system.
 Intruders may be from outside the network or
legitimate users of the network.
 Intrusion can be a physical, system or remote
intrusion.
 Intrusion Detection Systems look for attack
signatures, which are specific patterns that
usually indicate malicious or suspicious intent.
WORK DONE!

Step
1
Network
Dataset(K Step
DD’99
dataset) 2
Pre- Step
Processin
g of Data 3
Feature Step
Extractio
n
4
Training
and Step
Testing of
Data 5
Result
Analysis
NETWORK DATASET (KDD’99 Dataset)

 KDD Cup 1999 has 4,898,431 Data Norma Probin


DoS R2L U2R
records in “train data set” & 311027 Set l g
records in “test data set”
10%
97277 4107 391458 1126 52
KDD
 KDD data set has 41 features
Correcte
60593 4106 229853 11347 70
 Types of Attack d KDD

 DoS – Denial of service


Whole 972780 41102 3883370 1126 50
 R2L – Remote to local attack
 U2R – User to Root attack
 Probe – Probing attack
PRE-PROCESSING OF DATA

 What is data cleaning?


 Fill in missing values, smooth noisy
data, identify or remove outliers and
resolve inconsistencies.

 What factors will be improved


after pre-processing of data?
 Accuracy
 Integrity
 Completeness
 Validity
 Consistency…
FEATURE EXTRACTION/ ENGINEERING
 Example
MACHINE LEARNING CLASSIFIERS

 We have used five classifiers in our model , they are


 DECISION TREE

 NAÏVE BAYES

 K-NEAREST NEIGHBOR (KNN)

 RANDOM FOREST CLASSIFIER

 LOGISTIC REGRESSION

 If you guys want , can add slides to explain the classifiers


TRAINING AND TESTING OF DATA

 How are we training the model using KDD dataset?


 How are we testing the data ?
 What is a confusion matrix?
 What are the result parameters that measure our model’s performance?
RESULTS
RESULTS
CONCLUSIONS

INTRUSION DETECTION APPLICATION:


An Intrusion detection application is developed from the knn model, flak front
end, HTML, CSS and java script. So, when a new file which contains the
details of a network is given to the intrusion detection application, it will be
able to detect weather the network is malicious or normal.
THANK YOU 

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy