Professional Documents
Culture Documents
Background
Problem Statement
Related Work
Research Gap
Proposed Model
Performance Evaluation Measures
Background
Features selection
Quantitative Features
Number of bytes in source packets, Source to Destination Packet Count
Qualitative Feature
Attack type, Protocol Used, Timing of Attack, Source IP Address, Destination IP Address
Problem Statement
Nearest Neighbour
Random Forest
Multilevel perceptron
Decision tree
Encoding of Qualitative Features
Precision
Recall
Accuracy
ROC curve
Types of Attacks Considered
Analysis
Backdoors
Exploits
Reconnaissance
Fuzzers
Generic
DoS
Shellcode
Training and Testing
Comparison with UNSW-NB15 data set and state of the art IDSs
from literature
Any Question
Allah Hafiz