0% found this document useful (0 votes)
12 views8 pages

Machine Learning and Deep Learning 2nd Review1

The document discusses the importance of cybersecurity and the role of machine learning (ML) and deep learning (DL) in network intrusion detection. It outlines the existing systems and proposes a new system that includes modules for dataset upload, manual data addition, attack classification, and graphical representation of data analysis. The project aims to enhance the identification of various network attacks, particularly those that are previously unseen, using advanced ML and DL techniques.

Uploaded by

soundharyas745
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views8 pages

Machine Learning and Deep Learning 2nd Review1

The document discusses the importance of cybersecurity and the role of machine learning (ML) and deep learning (DL) in network intrusion detection. It outlines the existing systems and proposes a new system that includes modules for dataset upload, manual data addition, attack classification, and graphical representation of data analysis. The project aims to enhance the identification of various network attacks, particularly those that are previously unseen, using advanced ML and DL techniques.

Uploaded by

soundharyas745
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Existing System

Cybersecurity is a set of technologies and processes designed to protect computers,


networks, programs and data from attacks and unauthorized access, alteration, or destruction. A
network security system consists of a network security system and a computer security system.
Each of these systems includes firewalls, antivirus software, and intrusion detection systems
(IDS). IDSs help discover, determine and identify unauthorized system behavior such as use,
copying, modification and destruction.The purpose of this project is for those who want to study
network intrusion detection in ML/DL.Thus, great emphasis is placed on a thorough description
of the ML/DL methods, and references to seminal works for each ML and DL method are
provided. Examples are provided concerning how the techniques were used in cyber
security.Similarly to ML methods, DL methods also have supervised learning and unsupervised
learning. Learning models built under different learning frameworks are quite different. The
benefit of DL is the use of unsupervised or semi-supervised feature learning and hierarchical
feature extraction to efficiently replace features manually.With the increasingly in-depth
integration of the Internet and social life, the Internet is changing how people learn and work, but
it also exposes us to increasingly serious security threats. How to identify various network
attacks, particularly not previously seen attacks, is a key issue to be solved urgently.
Proposed System

The concept of DL was proposed by Hinton et al. based on the deep belief network
(DBN), in which an unsupervised greedy layer-by-layer training algorithm is proposed that
provides hope for solving the optimization problem of deep structure. Then the deep structure of
a multi-layer automatic encoder is proposed. In addition, the convolution neural network
proposed by Lecun et al. is the first real multi-layer structure learning algorithm that uses a space
relative relationship to reduce the number of parameters to improve the training
performance.Feature processing is the process of putting domain knowledge into a feature
extractor to reduce the complexity of the data and generate patterns that make learning
algorithms work better. Feature processing is time-consuming and requires specialized
knowledge. In ML, most of the characteristics of an application must be determined by an expert
and then encoded as a data type. Features can be pixel values, shapes, textures, locations, and
orientations. The performance of most ML algorithms depends upon the accuracy of the features
extracted.Dataset Intrusion Detection Dataset was applied to the 3rd International Knowledge
Discovery and Data Mining Tools Contest. This model identifies features between intrusive and
normal connections for building network intrusion detectors. In the NSL-KDD dataset, each
instance has the characteristics of a type of network data. It contains 22 different attack types
grouped into 4 major attack types.Dos back, Neptune, smurf, teardrop, land, pod Probe Satan,
portsweep, ipsweep, nmap. R2L Warezmaster, warezclient, ftpwrite, guesspassword, imap,
multihop, phf, spy U2R Rootkit, butteroverflow, loadmodule, perl.
Data Flow Diagram
Project Description

Modules:
Upload dataset

Users search the any link notably, not all network traffic data generated by malicious apps
correspond to malicious traffic. Many malware take the form of repackaged benign apps; thus,
malware can also contain the basic functions of a benign app. Subsequently, the network traffic
they generate can be characterized by mixed benign and malicious network traffic. This dataset
is upload.

Manual adding data

User handling for some various times of smart phones ,desktops laptops and tablets .If any kind
of devices attacks for some unauthorized malware softwares.In this malware on threats for user
personal dates includes for personal contact, bank account numbers and any kind of personal
documents are hacking in possible. So add the network data in manualy.

Classifying attacks

Here, we compare the classification performance of SVM with other popular machine learning
algorithms. We have selected several popular classification algorithms. For all algorithms, we
attempt to use multiple sets of parameters to maximize the performance of each algorithm. Using
SVM algorithms classification for malware bag-of-words weightage.

Graphical representation

The main part of the project is to analysis the attack types in the network dataset. The user data
analysis of the data can be done by charts format. This is the place where admin have ability to
come for particular solution about proposed system. The pictorial representations of collected
data are shown in the form of graphs. The different graphs give the best analysis of the system.
UML Diagram

Class Diagram
Use case Diagram
Activity Diagram
Sequence Diagram

You might also like