0% found this document useful (0 votes)
19 views

Ppt_intrusion Detection System Using Machine Learning

Uploaded by

sarthakrock.1353
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Ppt_intrusion Detection System Using Machine Learning

Uploaded by

sarthakrock.1353
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

INTRUSION DETECTION SYSTEM

USING MACHINE LEARNING


INTRODUCTION
 Intrusion : Attempting to break into or misuse
your system.
 Intruders may be from outside the network or
legitimate users of the network.
 Intrusion can be a physical, system or remote
intrusion.
 Intrusion Detection Systems look for attack
signatures, which are specific patterns that
usually indicate malicious or suspicious intent.
WORK DONE!

Step
1
Network
Dataset(K Step
DD’99
dataset) 2
Pre- Step
Processin
g of Data 3
Feature Step
Extractio
n
4
Training
and Step
Testing of
Data 5
Result
Analysis
NETWORK DATASET (KDD’99 Dataset)

 KDD Cup 1999 has 4,898,431 Data Norma Probin


DoS R2L U2R
records in “train data set” & 311027 Set l g
records in “test data set”
10%
97277 4107 391458 1126 52
KDD
 KDD data set has 41 features
Correcte
60593 4106 229853 11347 70
 Types of Attack d KDD

 DoS – Denial of service


Whole 972780 41102 3883370 1126 50
 R2L – Remote to local attack
 U2R – User to Root attack
 Probe – Probing attack
PRE-PROCESSING OF DATA

 What is data cleaning?


 Fill in missing values, smooth noisy
data, identify or remove outliers and
resolve inconsistencies.

 What factors will be improved


after pre-processing of data?
 Accuracy
 Integrity
 Completeness
 Validity
 Consistency…
FEATURE EXTRACTION/ ENGINEERING
 Example
MACHINE LEARNING CLASSIFIERS

 We have used five classifiers in our model , they are


 DECISION TREE

 NAÏVE BAYES

 K-NEAREST NEIGHBOR (KNN)

 RANDOM FOREST CLASSIFIER

 LOGISTIC REGRESSION

 If you guys want , can add slides to explain the classifiers


TRAINING AND TESTING OF DATA

 How are we training the model using KDD dataset?


 How are we testing the data ?
 What is a confusion matrix?
 What are the result parameters that measure our model’s performance?
RESULTS
RESULTS
CONCLUSIONS

INTRUSION DETECTION APPLICATION:


An Intrusion detection application is developed from the knn model, flak front
end, HTML, CSS and java script. So, when a new file which contains the
details of a network is given to the intrusion detection application, it will be
able to detect weather the network is malicious or normal.
THANK YOU 

You might also like