0% found this document useful (0 votes)
1 views

LSP Wireless network attacks using supervised machine learning techniques

The document presents a comprehensive analysis of using supervised machine learning techniques for predicting wireless network attacks, highlighting the importance of data collection, preprocessing, and model evaluation. It discusses existing systems and proposes a new framework that improves accuracy in detecting various types of attacks, such as DDoS and Wormhole attacks. The study emphasizes the need for real-time analysis and the challenges faced in implementing these techniques effectively.

Uploaded by

hodece
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

LSP Wireless network attacks using supervised machine learning techniques

The document presents a comprehensive analysis of using supervised machine learning techniques for predicting wireless network attacks, highlighting the importance of data collection, preprocessing, and model evaluation. It discusses existing systems and proposes a new framework that improves accuracy in detecting various types of attacks, such as DDoS and Wormhole attacks. The study emphasizes the need for real-time analysis and the challenges faced in implementing these techniques effectively.

Uploaded by

hodece
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

WIRELESS NETWORK

ATTACKS USING
SUPERVISED MACHINE
LEARNING TECHNIQUES
TJS ENGINEERING COLLEGE

TJS Nagar, Kavarapettai, Thiruvallur-601206


(Approved by AICTE, New Delhi & Affiliated to Anna University, Chennai)

An ISO 9001:2008 Certified Institution

DEPARTMENT OF ELECTRONIC COMMUNICATION ENGINEERING


Date :
TEAM MEMBERS:

PAVITHRA K 112820104304
POOJA S 112820104305
LOGESWARI S 112820104007
SUNDERESWARAN S 112820106317

SUPERVISOR NIRUMALA D
ABSTRACT
• Network attacks pose a significant threat to the security and integrity of computer
networks. The ability to predict and prevent these attacks is crucial for maintaining
a secure network environment. Supervised machine learning techniques have
emerged as effective tools for network attack prediction due to their ability to
analyze large amounts of network data and identify patterns indicative of malicious
activity. We present a comprehensive analysis of supervised machine learning
techniques for the prediction of network attacks. We collect and pre-process the
data, extracting relevant features and transforming them into a suitable format for
machine learning algorithms.
• We evaluate the performance of these algorithms. We investigate the
interpretability of the trained models to gain insights into the underlying patterns
and characteristics of network attacks. This allows network administrators to
understand the nature of attacks and develop appropriate defences strategies.
Additionally, we discuss the challenges and limitations associated with the
application of supervised machine learning techniques in the domain of network
attack prediction, such as the need for real-time analysis and the emergence of
sophisticated evasion techniques.
LITERATURE REVIEW:
• Title :Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN
• Author: Mohammed S.Alsahli, Marwah M.Almasri, Mousa Al-Akhras, Abdulaziz I.Al-Issa, Mohammed
Alawairdhi
• Year : 2021
• Technology has revolutionized into connecting “things” together with the rebirth of the global network
called Internet of Things (IoT). This is achieved through Wireless Sensor Network (WSN) which introduces
new security challenges for Information Technology (IT) scientists and researchers. This paper addresses the
security issues in WSN by establishing potential automated solutions for identifying associated risks. It also
evaluates the effectiveness of various machine learning algorithms on two types of datasets, mainly, KDD99
and WSN datasets. The aim is to analyze and protect WSN networks in combination with Firewalls, Deep
Packet Inspection (DPI), and Intrusion Prevention Systems (IPS) all specialized for the overall protection of
WSN networks. Multiple testing options were investigated such as cross validation and percentage split.
Based on the finding, the most accurate algorithm and the least time processing were suggested for both
datasets.
LITERATURE REVIEW:
• Title :Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
• Author: Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato and Hwee-Pink Tan
• Year : 2015
• wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic
behavior is either caused by external factors or initiated by the system designers themselves. To adapt to
such conditions, sensor networks often adopt machine learning techniques to eliminate the need for
unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource
utilization and prolong the lifespan of the network. In this paper, we present an extensive literature
review over the period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed
algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid
WSN designers in developing suitable machine learning solutions for their specific application
challenges.
EXISTING SYSTEM:

• Distributed denial-of-service (DDoS) attacks continue to grow at a rapid rate plaguing Internet Service
Providers (ISPs) and individuals in a stealthy way. Thus, intrusion detection systems (IDSs) must evolve
to cope with these increasingly sophisticated and challenging security threats. Traditional IDSs are prone
to zero-day attacks since they are usually signature-based detection systems. However, the lack of up-to-
date labelled training datasets makes these ML/DL based IDSs inefficient. The privacy nature of these
datasets and widespread emergence of adversarial attacks make it difficult for major organizations to share
their sensitive data. Federated Learning (FL) is gaining momentum from both academia and industry as a
new sub-field of ML that aims to train a global statistical model across multiple distributed users, referred
to as collaborators, without sharing their private data. Due to its privacy-preserving nature, FL has the
potential to enable privacy-aware learning between a large numbers of collaborators. This paper presents a
novel framework, called MiTFed that allows multiple software defined networks (SDN) domains (i.e.,
collaborators) to collaboratively build a global intrusion detection model without sharing their sensitive
datasets. It a promising framework to cope with the new emerging security threats in SDN.
DISADVANTAGES:

• They did not use any machine learning


algorithms.
• Accuracy was low.
• They did not build a deploy model.
PROPOSED SYSTEM:

• We proposed a system to develop the project using machine learning algorithm.


Recently, Machine learning and Artificial intelligence has plays a big role in various
industries for their improvement and development. So we tried to implement machine
learning algorithm to make them more securable. The aim of this project is about provide
the thread to intimate the security to stop the thread before it impact huge loss to
organization or individuals. We collect the previous record of the attacks that had
happened over these times. By collecting these records our machine learning algorithm
tried to find out the pattern to those dataset. After finding those patterns the machine is
able to predict the instance based on previous records. By doing that with various
algorithm we can get high accuracy. We say our model good based on high accuracy
values.
ADVANTAGES:

• We build a framework based user friendly application using django.


• We use multiple machine learning algorithms for train data.
• Accuracy was improved.
Objectives:
AIM AND OBJECTIVE:
• This analysis aims to observe which features are most helpful in
predicting the WSN of BLACKHOLE, FLOODING, GRAYHOLE, NORMAL and
SCHEDULING to see the general trends that may help us in model
selection and hyper parameter selection. To achieve used machine
learning classification methods to fit a function that can predict the
discrete class of new input.
AIM:
• WSN is one of the major factors in our major domain. The most
devastating and complicated attack in a wireless sensor network is the
Wormhole attack. In this attack, the attacker keeps track of the packets
and makes a tunnel with other nodes of different communication
networks, and thus the attacker passes the packets through this tunnel.
So this project can easily find out the Attack.
ENVIRONMENTAL REQUIREMENTS:

1. Software Requirements:
Operating System : Windows
Tool : Anaconda with Jupyter Notebook
2. Hardware requirements:
Processor : Pentium IV/III
Hard disk : minimum 100 GB
RAM : minimum 4 GB
SYSTEM ARCHITECTURE:
USE CASE DIAGRAM:
CLASS DIAGRAM:
ACTIVITY DIAGRAM:
SEQUENCE DIAGRAM:
ENTITY RELATIONSHIP DIAGRAM (ERD)
COLLABORATION DIAGRAM:
LIST OF MODULES:
Data pre-processing
Data Analysis of Visualization
Ridge Classifier Algorithm(RC)
Random forest Algorithm(RF)
Bernoulli naive bayes Algorithm(BNB)
Deployment Using Result
MODULE DESCRIPTION:

Data Pre-processing:
• Validation techniques in machine learning are used to get the error rate of the Machine
Learning (ML) model, which can be considered as close to the true error rate of the dataset.
If the data volume is large enough to be representative of the population, you may not need
the validation techniques. However, in real-world scenarios, to work with samples of data
that may not be a true representative of the population of given dataset. To finding the
missing value, duplicate value and description of data type whether it is float variable or
integer. The sample of data used to provide an unbiased evaluation of a model fit on the
training dataset while tuning model hyper parameters.
DATA VISUALIZATION:

• Data visualization is an important skill in applied statistics and machine learning.


Statistics does indeed focus on quantitative descriptions and estimations of data. Data
visualization provides an important suite of tools for gaining a qualitative understanding.
This can be helpful when exploring and getting to know a dataset and can help with
identifying patterns, corrupt data, outliers, and much more. With a little domain
knowledge, data visualizations can be used to express and demonstrate key relationships
in plots and charts that are more visceral and stakeholders than measures of association
or significance. Data visualization and exploratory data analysis are whole fields
themselves and it will recommend a deeper dive into some the books mentioned at the
end.
PROGRAM
OUTPUT:
CONCLUSION:

• The analytical process started from data cleaning and processing, missing value,
exploratory analysis and finally model building and evaluation. The best accuracy on
public test set is higher accuracy score will be find out by comparing each algorithm
with type of all WSN Attacks for future prediction results by finding best connections.
This brings some of the following insights about diagnose the network attack of each
new connection. To presented a prediction model with the aid of artificial intelligence
to improve over human accuracy and provide with the scope of early detection. It can
be inferred from this model that, area analysis and use of machine learning technique
is useful in developing prediction models that can helps to network sectors reduce the
long process of diagnosis and eradicate any human error.
FUTURE WORK:

• Network sector want to automate and detecting the attacks of


packet transfers from eligibility process (real time) based on the
connection detail.
• To automate this process by show the prediction result in web
application or desktop application at cloud.
• To optimize the work to implement in Artificial Intelligence
environment.
THANK YOU

You might also like