Proposal
Proposal
Proposal
Project Proposal
Session: 2021-2025
Submitted by:
Aniqa Noor 2021-CS-626
Nimra Shahzadi 2021-CS-636
Iqra Asghar 2021-CS-702
Supervised by:
Dr. Irfan Yousuf
i
List of Figures
1.1 Workflow of Intrusion Detection System . . . . . . . . 6
1.2 Sample Gantt chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
ii
List of Tables
1.1 Related System Analysis . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Work Division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
iii
Chapter 1
Proposal Synopsis
1.1 Abstract
In today's digital marketplace, consumers face a plethora of options when
shopping online, highlighting the importance of informed decision-making for
optimal value. To address this, we propose a dynamic price comparison website
utilizing web scraping technology. This platform empowers users to seamlessly
compare product prices across multiple e-commerce platforms, enabling
informed purchasing decisions. Our website features a user-friendly interface
with a simple search bar initiating real-time price retrieval from designated
retailers. The data is meticulously analyzed and presented clearly, allowing users
to identify the most competitive offers effortlessly. Additionally, the platform
integrates user reviews, product ratings, and specifications to provide a
comprehensive view of the product landscape. Privacy and data security are
prioritized, ensuring compliance with regulations and robust protection
measures. Ultimately, our price comparison website aims to empower consumers
with the insights needed to optimize their online shopping experience.
1.2 Introduction
In the rapidly evolving digital marketplace, consumers are increasingly
confronted with the challenge of sifting through a myriad of online retailers to
find the best deals and prices for products. Presently, various price comparison
tools and websites attempt to address this need, yet many lack comprehensive
coverage or user-friendly interfaces, leaving consumers frustrated and
dissatisfied. In response to these shortcomings, we propose the development of a
dynamic price comparison website powered by innovative web scraping
technology.
Unlike existing solutions that may offer limited coverage or present data in a
complex manner, our solution stands out for its comprehensive approach and
user-friendly interface. By leveraging web scraping technology, our platform
systematically gathers real-time pricing data from a wide range of e-commerce
Proposal Synopsis 2
websites, providing users with a holistic view of the market landscape. This
ensures that users have access to the most up-to-date and extensive pricing
information, enabling them to make informed purchasing decisions with
confidence.
The advantages of our price comparison website are manifold. Firstly, it offers
unparalleled convenience and efficiency by streamlining the process of
comparing prices across multiple retailers. With just a few clicks, users can access
comprehensive pricing information, saving time and effort. Additionally, our
platform enhances transparency in the online shopping experience, empowering
consumers with the knowledge needed to secure the best deals and optimize
their purchasing power. By prioritizing user experience and comprehensive
coverage, our solution revolutionizes the way consumers navigate the
complexities of the digital marketplace.
1.4 Objectives
Develop a user-friendly price comparison website capable of comparing
prices of specific products across multiple e-commerce websites.
Implement web scraping algorithms to retrieve real-time pricing data from
designated online retailers.
Design and integrate a streamlined search functionality, allowing users to
input the desired product and retrieve comprehensive price comparisons.
Incorporate additional features such as product reviews, ratings, and
specifications to provide users with a holistic view of the product
landscape.
Ensure the scalability and reliability of the website to accommodate a
growing database of products and retailers.
Optimize the website for performance and speed to enhance user
experience and minimize loading times.
Implement robust security measures to safeguard user information and
ensure compliance with data protection regulations.
Conduct thorough testing and debugging to identify and resolve any
technical issues or discrepancies in price comparison accuracy.
Gather feedback from users to continually improve and enhance the
functionality and usability of the website.
Measure and evaluate the effectiveness of the website based on metrics
such as user engagement, satisfaction, and the frequency of successful
price comparisons.
1.5 Scope
The following points outline the scope of intrusion detection system:
Proposal Synopsis 4
features from the dataset and outputs from the classifiers, demonstrating
effectiveness on the CICIDS2017 dataset.
6. Radford et al.[6] have utilized LSTM RNNs for anomaly detection with the
ISCX IDS dataset, achieving AUC values between 0.39 and 0.84. A recurrent
neural network (RNN) is used to learn a model for representing network
communication sequences, enabling the identification of outlier network
traffic without relying on known malicious behaviour patterns.
7. Pektas and Acarman.[7] have proposed a combination of convolutional and
recurrent neural networks for botnet detection, achieving high accuracy
(99.3%) and F-measure (99.1%) on datasets like CTU-13 and ISOT,
surpassing traditional methods like blacklists and signature matching. The
approach leverages analysis of botnet network communication flows and rich
datasets for training and testing, demonstrating the effectiveness of deep
learning for identifying evolving botnet variants.
8. Nguyen et al.[8] have proposed an IDS platform, IDS-CNN, based on
convolutional neural networks (CNN) for detecting DoS attacks, achieving
high accuracy (up to 99.87%) compared to traditional machine learning
techniques like KNN, SVM, and Naïve Bayes. The system aims to provide
real-time protection against malicious network traffic, addressing challenges
such as detection complexity and execution time.
9. Shone et al.[9] have introduced a novel deep learning technique, the
nonsymmetric deep autoencoder (NDAE), for intrusion detection, aiming to
reduce human interaction and improve detection accuracy. The proposed
model, implemented in GPU-enabled TensorFlow, demonstrates promising
results on the KDD Cup '99 and NSL-KDD datasets, showing improvements
over existing approaches and strong potential for modern NIDSs.
10. Farnaaz and Jabbar.[10] have presented a model for intrusion detection
using the random forest classifier, aiming to address the complexities and
challenges of IDS. The model, evaluated on the NSL-KDD dataset,
demonstrates high efficiency with low false alarm rates and high detection
rates, indicating its effectiveness in detecting and classifying attacks compared
to traditional classifiers.
Table 1.1: Related System Analysis
Related Weakness Proposed Project Solution
System
Liu and Limited context and high false Make packet-based systems smarter,
Lang.[1] positives, Resource intensiveness, speed up packet and session-based
challenges with encrypted traffic systems, Looking inside encrypted
and difficulty in detecting
messages and Getting smarter against
sophisticated attacks
attacks
Alrawashdeh Redundant information, high- Feature selection and seep learning,
Proposal Synopsis 6
Data Collection
Data Pre-processing
Model Training
Model Evaluation
Deployment(Optional)
1. Data Collection:
• We will evaluate the model on publicly available dataset
and we will not capture the data.
Proposal Synopsis 8
• React.JS
• Attacks were executed over a period of five days, starting from July 3, 2017.
• The dataset includes detailed network configurations, traffic interactions, attack
timings, and metadata.
• It provides a realistic representation of real-world network data for cybersecurity
research and development.
Proposal Synopsis 10
References
[1] Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for
intrusion detection systems: A survey. applied sciences, 9(20), 4396.
[2] Alrawashdeh, K., & Purdy, C. (2016, December). Toward an online anomaly
intrusion detection system based on deep learning. In 2016 15th IEEE
international conference on machine learning and applications (ICMLA) (pp.
195-200). IEEE.
[3] Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on software
engineering, (2), 222-232.
[4] Zhao, G., Zhang, C., & Zheng, L. (2017, July). Intrusion detection using deep belief network
and probabilistic neural network. In 2017 IEEE international conference on computational
science and engineering (CSE) and IEEE international conference on embedded and
ubiquitous computing (EUC) (Vol. 1, pp. 639-642). IEEE.
[5] Ahmim, A., Maglaras, L., Ferrag, M. A., Derdour, M., & Janicke, H. (2019, May). A novel
hierarchical intrusion detection system based on decision tree and rules-based models.
In 2019 15th International Conference on Distributed Computing in Sensor Systems
(DCOSS) (pp. 228-233). IEEE.
[6] Radford, B. J., Apolonio, L. M., Trias, A. J., & Simpson, J. A. (2018).
Network traffic anomaly detection using recurrent neural networks. arXiv
preprint arXiv:1803.10769.
[7] Pektaş, A., & Acarman, T. (2019). Deep learning to detect botnet via network flow
summaries. Neural Computing and Applications, 31(11), 8021-8033.
[8] Nguyen, S. N., Nguyen, V. Q., Choi, J., & Kim, K. (2018, February). Design and
implementation of intrusion detection system using convolutional neural network for DoS
detection. In Proceedings of the 2nd international conference on machine learning and soft
computing (pp. 34-38).
[9] Lim, B., Son, S., Kim, H., Nah, S., & Mu Lee, K. (2017). Enhanced deep residual networks
for single image super-resolution. In Proceedings of the IEEE conference on computer vision
and pattern recognition workshops (pp. 136-144).
[10] Farnaaz, N., & Jabbar, M. A. (2016). Random forest modelling for
network intrusion detection system. Procedia Computer Science, 89, 213-217.