Final Year Project
Final Year Project
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
3
2 4 • Hard Disk : 40 GB.
1 5 • Ram : 512 Mb.
8 6
7 SOFTWARE REQUIREMENTS:
• Operating system : Windows.
• Coding Language : python.
05
USE CASE DIAGRAM
3 Pre-process Dataset
2 4
Dataset Train & Test Split
1 5
User.
Train Deep Learning GAN
Algorithm
8
7 6
Comparison Graph
06
ARCHITECTURE
3
2 4
1 5
8 6
7
07
MODULES PYTHON ECOSYSTEM OVERVIEW :
IMPLEMENTATION
aem and
is
eys
ce's
pher
y.
gucial
aureis
on-
y,
pin
orld
for
orost
non-a
ding
nyle
and
ypes
cate
or -ed
oss
nd
es
are so
sage
a
the
ic
DEVELOPMENT
PLANNING AND INTEGRATION DEPLOYMENT
OF MONITORING
DESIGN: AND DETECTION
AND TESTING : AND
MODULES: MAINTENANCE:
1. Identify the specific 1. Integrate the monitoring 1. 1 deploy the cybersecurity tool
cybersecurity requirements and and detection modules set in the target network
objectives for network 1. Implement modules for real- into a cohesive environment, following best
monitoring and intrusion time network monitoring, practices for security and
cybersecurity tool set.
detection capturing and analyzing performance.
2. Define the scope of the project, 2. To conduct thorough 2. Monitor the tool sets and
network traffic, and testing to validate the
including the types of threats monitoring system activities. production to identify any
to detect and the network functionality and issues or false positives /
2. Develop interaction detection
infrastructure to monitor. algorithms utilizing effectiveness of the tool negatives and perform regular
3. Design the architecture and set in detecting various updates and maintenance.
techniques such as signature-
components of the types of cyber threats 3. Provide documentation and
based detection, anomaly
cybersecurity tool set, 3. perform integration training for users to effectively
detection, and machine
considering factors such as utilize the tool set for ongoing
learning testing to ensure
scalability, performance, and network security monitoring
ease of deployment.
3. Integrate third party libraries compatibility with and intrusion detection.
4. Finally define requirements, or frameworks as needed, different network 4. Finally deploy tool sets,
scope, and architecture for the such as pyShark for packet environments and monitor, and provide ongoing
tool set capturing or scikit-learn for operating systems. maintenance.
machine learning algorithms
In above screen click on ‘Upload UNSW-NB15 Dataset’ button to upload dataset and then will get below output
In above screen selecting and uploading ‘UNSW’ dataset file and then click on ‘Open’ button to load dataset and then will get
below output
In above screen dataset loaded and in text area can see dataset contains both numeric and non-numeric values so by
employing label encoder class will convert non-numeric data to numeric data as Algorithm will take only numeric
values. In above graph x-axis represents attack names and y-axis represents count of those attacks found in dataset.
Now close above graph and then click on ‘Pre-process Dataset’ button to clean dataset and then will get below output
In above screen can see all dataset values converted to numeric format and in last lines can see dataset size and its
features or column numbers and now click on ‘Dataset Train & Test Split’ button to split dataset into train and test and
then will get below output
In above screen can see train and test and now click on ‘Train Deep Learning GAN Algorithm’ button to train model and get
below output
In above screen GAN model got 98% accuracy and can see other In above graph all different colour bars represents
metrics like precision, recall etc. In Confusion matrix graph x- different metrics and can see all metrics are closer to
axis represents Predicted Labels and y-axis represents True 100%. Now close above graph and then click on
Labels and all different colour boxes in diagnol represents ‘Attack Prediction from Test Data’ button to upload test
correct prediction count and remaining all blue boxes represents data and get below output
incorrect prediction count which are very few. Now close above
graph and then click on ‘Comparison Graph’ button to get below
graph
In above screen selecting and uploading ‘testdata.csv’ file and then click on ‘Open’ button to get below output
ADVANTAGES
ADVANTAGES: