Professional Documents
Culture Documents
(Affiliated to Visvesvaraya Technological University, Belagavi & Approved by AICTE, New Dehli)
NETWORK INTRUSION DETECTION SYSTEM USING RECURRENT NEURAL NETWORKS AND DEEP NEURAL
NETWORKS
BATCH- 15
Presented by:
Chandrakala C Y (1SG17IS023)
Anjana G Nadig (1SG18IS010)
Harshitha R (1SG18IS040)
Likhitha D J (1SG18IS054)
Under the guidance of
Chandini A
Assistant Professor
Dept.of ISE, SCE
Dept of ISE,SCE 2021-22 1
CONTENTS Topics
01 INTRODUCTION
02 EXISTING SYSTEM
03 PROPOSED SYSTEM
04 LITERATURE SURVEY
05 FUNCTIONAL&NON-FUNCTIONAL REQUIREMENTS
06 HARDWARE REQUIREMENTS
07 SOFTWARE REQUIREMENTS
08 CONCLUSION
Most of the existing work focused on older datasets to detect network attacks.
Attacks such as DOS, DDOS, Web Attacks, Bot Net attacks are detected.
The DNN based IDS is reliable and efficient in intrusion detection for identifying the specific
attack classes with required number of samples for training.
An RNN remembers each and every information through time. It is useful in time series
prediction only because of the feature to remember previous inputs as well.
Dept of ISE,SCE 2021-22 5
Block Diagram
1. Using Deep Learning Techniques for Sara Al-Emadi evaluate the performance of the
Network Intrusion Detection proposed solution using different
evaluation matrices and we present
a comparison between the results of
our proposed solution to find the
best model for the network
intrusion detection system.
2.Network Intrusion Detection Based on Wang Peng The results show that the proposed
Deep Learning method has a significant
improvement over the traditional
machine learning accuracy.
Intrusion Detection System based Dimitra Chamou The experimental results for the
on Network Traffic using Deep real-time intrusion detection
Neural Networks system showed that the
proposed model can achieve
high accuracy, and low false
positive rate, while
distinguishing between
malicious and normal network
traffic.
Investigating Network Intrusion Gabriel Chukwunonso Amaizu Results showed the model to
Detection Datasets Using perform best for NSL-KDD,
Machine Learning followed by UNSW-NB15 and
CSECIC-IDS2018 respectively.
Model accuracy achieved for
these datasets were NSL-KDD
(97.89%), UNSW-NB15
(89.99%), and CSE-CIC-
IDS2018 (76.47%) was achieved.
Dept of ISE,SCE
2021-22 9
Non functional Requirements
Dept of ISE,SCE
2021-22 10
Hardware Requirements
Processor: Above 1.5GHZ
Hard Disk: 80GB
RAM: 2GB
SOFTWARE REQUIREMENTS
Language: Python
OS: Windows 10(64bit)
Package- Python 3.7
Software- Anaconda