Machine Learning and Deep Learning 2nd Review1
Machine Learning and Deep Learning 2nd Review1
The concept of DL was proposed by Hinton et al. based on the deep belief network
(DBN), in which an unsupervised greedy layer-by-layer training algorithm is proposed that
provides hope for solving the optimization problem of deep structure. Then the deep structure of
a multi-layer automatic encoder is proposed. In addition, the convolution neural network
proposed by Lecun et al. is the first real multi-layer structure learning algorithm that uses a space
relative relationship to reduce the number of parameters to improve the training
performance.Feature processing is the process of putting domain knowledge into a feature
extractor to reduce the complexity of the data and generate patterns that make learning
algorithms work better. Feature processing is time-consuming and requires specialized
knowledge. In ML, most of the characteristics of an application must be determined by an expert
and then encoded as a data type. Features can be pixel values, shapes, textures, locations, and
orientations. The performance of most ML algorithms depends upon the accuracy of the features
extracted.Dataset Intrusion Detection Dataset was applied to the 3rd International Knowledge
Discovery and Data Mining Tools Contest. This model identifies features between intrusive and
normal connections for building network intrusion detectors. In the NSL-KDD dataset, each
instance has the characteristics of a type of network data. It contains 22 different attack types
grouped into 4 major attack types.Dos back, Neptune, smurf, teardrop, land, pod Probe Satan,
portsweep, ipsweep, nmap. R2L Warezmaster, warezclient, ftpwrite, guesspassword, imap,
multihop, phf, spy U2R Rootkit, butteroverflow, loadmodule, perl.
Data Flow Diagram
Project Description
Modules:
Upload dataset
Users search the any link notably, not all network traffic data generated by malicious apps
correspond to malicious traffic. Many malware take the form of repackaged benign apps; thus,
malware can also contain the basic functions of a benign app. Subsequently, the network traffic
they generate can be characterized by mixed benign and malicious network traffic. This dataset
is upload.
User handling for some various times of smart phones ,desktops laptops and tablets .If any kind
of devices attacks for some unauthorized malware softwares.In this malware on threats for user
personal dates includes for personal contact, bank account numbers and any kind of personal
documents are hacking in possible. So add the network data in manualy.
Classifying attacks
Here, we compare the classification performance of SVM with other popular machine learning
algorithms. We have selected several popular classification algorithms. For all algorithms, we
attempt to use multiple sets of parameters to maximize the performance of each algorithm. Using
SVM algorithms classification for malware bag-of-words weightage.
Graphical representation
The main part of the project is to analysis the attack types in the network dataset. The user data
analysis of the data can be done by charts format. This is the place where admin have ability to
come for particular solution about proposed system. The pictorial representations of collected
data are shown in the form of graphs. The different graphs give the best analysis of the system.
UML Diagram
Class Diagram
Use case Diagram
Activity Diagram
Sequence Diagram