BTP Presentation
BTP Presentation
BTP Presentation
A NIDS reads all inbound packets and searches for any suspicious patterns. When
threats are discovered, based on its severity, the system can take action such as
notifying administrators, or barring the source IP address from accessing the network.
Introduction
NIDS can be hardware or software-based systems
and, depending on the manufacturer of the
system, can attach to various network mediums
such as Ethernet, FDDI, and others.
• The other limitation is that they do not have the ability to detect new attacks
that use new signatures because they don't have these signatures in their
knowledge base.
The dataset also includes delta port statistics which indicates the change in
magnitude of observed port statistics within a time interval. We also address
the limitation of the presence of tail classes.
Port Statistics( 9 )
These statistics relay the collected metrics and magnitudes from every single
port within the SDN when a flow is simulated between two hosts.
• TCP-SYN Flood: A Distributed Denial of Service (DDoS) attack where attackers target hosts by initiating
many Transmission Control Protocol (TCP) handshake processes without waiting for the response from
the target node. By doing so, the target device's resources are consumed as it has to keep allocating some
memory space for every new TCP request.
• Port scan: An attack in which attackers scan available ports on a host device to learn information about
the services, versions, and even security mechanisms that are running on that host.
• Flow Table Overflow: An attack that targets network switches/routers where attacks compromise the
functionality of a switch/router by consuming the flow tables that forward packets with illegitimate flow
entries and rules so that legitimate flow entries and rules cannot be installed.
• Blackhole: An attack that targets network switches/routers to discard the packets that pass through,
instead of relaying them on to the next hop.
• Traffic Diversion: A attack that targets network switches/routers to reroute the direction of packets
away from their destination, intending to increase travel time and/or spying on network traffic through
a man-in-the-middle scenario.
1.Batch Size
2. Optimizer and Learning rate
3. Activation Function
4.Hidden layers and no. of neurons
Final model’s confusion matrix Accuracy table for different ML
Models
MLP:
Conclusion
● Successful implemented a model using deep learning which has
a better accuracy than many traditional ML models
2. Johansson Daniel, Andersson Par, “Network Intrusion Detection Systems with Correlation Capabilities”
4. Kumar Vinod, Sangwan Prakash Om, “Signature Based Intrusion Detection System Using SNORT”, IJCAIT,
International Journal of Computer Applications & Information Technology, Vol. I, Issue III, November 2012.
5. Singh Deepak Kumar, Gupta Jitendra Kumar, “An approach for Anomaly based Network Intrusion detection
System using SNORT“, IJSER, International Journal of Scientific & Engineering Research, Volume 4, Issue 9,
September 2013.
6. S, Vijayarani, and Maria Sylviaa S. “Network Intrusion Detection System – A Study”, IJSPTM, International Journal
of Security, Privacy and Trust Management ,Vol 4, Issue 1, pp. 31–44, February 2015.
Thank You