MMAKR
MMAKR
(BIT CAMPUS)
ANNA UNIVERSITY, TIRUCHIRAPALLI
AI IN CYBERSECURITY
A PROJECT REPORT
For
NAAN MUDHALVAN(NM1067) –AI And Green Skills
Submitted by
KABIL RAJ.A(810022104712)
III-Year/VI – Semester (2024-2025)
B.E – Computer Science and Engineering
Submitted to
Mr.J.B.Shriram
TABLE OF CONTENT
CHAPTER CONTENT
1 AIM
2 PROBLEM STATEMENT
3 PROJECT OBJECTIVES
4 VARIABLES USED
5 IMPLEMENTATION DETAILS
6 INPUT CODE
7 SAMPLE CODE
8 FUTURE ENHANCEMENTS
9 CONCLUSION
AIR QUALITY INDEX PREDICTOR
Aim:
The aim of this project is to explore how Artificial Intelligence (AI)
can be leveraged to enhance cybersecurity frameworks. This
involves the use of machine learning (ML), deep learning (DL), and
data analytics to identify threats, detect anomalies, respond to
incidents, and predict future vulnerabilities in networks and systems,
thereby reducing manual effort and improving security posture.
Problem Statement:
Cybersecurity threats are growing in sophistication and frequency.
Traditional systems that rely on manually defined rules and signature-based
detection are increasingly unable to cope with zero-day exploits,
polymorphic malware, insider threats, and advanced persistent threats
(APTs). These threats often go undetected for long periods, resulting in data
breaches, financial losses, and reputation damage.
Given the massive scale of digital activity and the complexity of modern
networks, there is a need for intelligent, scalable, and adaptive security
systems. AI can fill this gap by learning from vast volumes of data,
recognizing patterns, and making decisions without human intervention.
Project Objectives:
Understand AI concepts relevant to cybersecurity (e.g.,
supervised/unsupervised learning, anomaly detection).
Analyze real-world cyberattack datasets to extract features relevant for
AI models.
Design and implement an AI-based intrusion detection system (IDS)
using algorithms like Random Forest, Neural Networks, and Autoencoders.
Evaluate model performance using metrics like accuracy, precision,
recall, F1-score, and false positive rate.
Simulate real-time threat detection to assess the practical applicability
of the system.
Propose a scalable architecture for integrating AI with existing
cybersecurity tools.
Variables Used:
IP Source and Identifies source and target of traffic.
Destination
Port Numbers – Helps determine services and potential attack vectors.
Implementation Details:
1. Dataset Selection
CICIDS2017:
UNSW-NB15:
NSL-KDD:
2. Data Preprocessing
a. Data Cleaning
o Packet size
o Flow duration
Convert categorical data (e.g., protocol types) into numerical values using one-
hot encoding or label encoding.
3. Model Selection
AI models can be supervised, unsupervised, or hybrid, depending on the
availability of labeled data.
Model Tuning: Adjust hyperparameters like tree depth (in Random Forest),
learning rate (in Gradient Boosting), or number of epochs (in Deep Learning).
5. Model Evaluation
For cybersecurity, Recall and False Positive Rate are more critical than just
Accuracy, as false negatives can mean undetected threats, and high false positives
can overwhelm analysts.
Use packet capture tools like Wireshark or tcpdump to collect live traffic.
Create a pipeline that:
o Captures packets.
Use Flask or FastAPI to expose the AI model as a REST API for integration
with real-world systems.
7. Tool Stack
Libraries:
Security Tools:
# Step 8: Predictions
y_pred = model.predict(X_test)
# Step 9: Evaluation
print("Accuracy Score:", accuracy_score(y_test, y_pred))
print("\nClassification Report:\n", classification_report(y_test, y_pred,
target_names=['Benign', 'Malicious']))
Conclusion:
Artificial Intelligence plays a transformative role in modern
cybersecurity by offering proactive and intelligent defense mechanisms. AI
can analyze massive amounts of data in real time, detect complex threats,
and automate responses with minimal human input. While promising,
challenges like data quality, model interpretability, and adversarial AI still
need to be addressed. Future cybersecurity systems must blend AI with
robust governance and compliance frameworks to ensure safe digital
environments.