You are on page 1of 28

CMR ENGINEERING COLLEGE

UGC AUTONOMOUS

Department of Electronics and Communication Engineering

Major Project Presentation on


A Novel Intrusion Detection Model for Detecting Known
and Innovative Cyberattacks using Convolutional Neural
Network
Batch No:D3
Under the Guidance of Submitted by:
Dr. S Rama Kishore B.Sandeep - (208R1A04I9)
Associate Professor B.Nagaraju - (208R1A04J0)
B.Ganesh - (208R1A04J1)
ECE, CMREC
B.Bhanu Prakash - (208R1A04J2)
A Novel Intrusion Detection Model for Detecting Known
and Innovative Cyberattacks using Convolutional Neural Network

2
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYNOPSIS
 Domain Introduction
 Abstract
 Introduction
 Objectives
 Existing System & Disadvantages
 Proposed System & Advantages
 System Requirements
 System Architecture
 Flow Diagram
 Modules
 Module Description
3
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DOMAIN INTRODUCTION

 Data mining is the computing process of discovering patterns in large datasets involving
methods at the intersection of machine learning, statistics and database systems.
 The overall goal of the data mining process is to extract information from a data set and
transform it into an understandable structure for further use.
 Data mining is the analysis step of the "knowledge discovery in databases" process, or KDD.

 Data mining is about finding new information in a lots of data.


 The information obtained from data mining is hopefully both new and useful. 4
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
ABSTRACT
 Intrusion detection is one of the important security problems in today’s cyber world.
 A significant number of techniques have been developed which are based on machine
learning approaches.
 So for identifying the intrusion we have designed the machine learning algorithms.
 By using the algorithm we find out intrusion and we can identify the attackers details also.
 IDS are mainly two types: Host based and Network based.
 A Host based Intrusion Detection System (HIDS) monitors individual host or device and
sends alerts to the user if suspicious activities such as modifying or deleting a system file,
unwanted sequence of system calls, unwanted configuration changes are detected. 5
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
CONTINUE…

 A Network based Intrusion Detection System (NIDS) is usually placed at network points such
as a gateway and routers to check for intrusions in the network traffic.
 Here Random Forest algorithm is used. “Random Forest” is a machine learning algorithm
which can be used for both classification and regression challenges. However, it is mostly
used in classification problems.
 Random forest (or random forests) is an ensemble classifier that consists of many decision
trees and outputs the class that is the mode of the class's output by individual trees.

6
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
CONTINUE…

 Random forests (RF) are a combination of tree predictors such that each tree depends on the
values of a random vector sampled independently and with the same distribution for all trees
in the forest.
 The generalization error of a forest of tree classifiers depends on the strength of the
individual trees in the forest and the correlation between them.
 This random forest classification and prediction algorithm will increase the performance of
the overall classification and prediction results.

7
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
INTRODUCTION
 A detailed investigation and analysis of various machine learning techniques have been carried
out for finding the cause of problems associated with various machine learning techniques in
detecting intrusive activities.
 Attack classification and mapping of the attack features is provided corresponding to each attack.

 Issues which are related to detecting low-frequency attacks using network attack dataset are also
discussed and viable methods are suggested for improvement.
 Machine learning techniques have been analyzed and compared in terms of their detection
capability for detecting the various category of attacks.

8
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
OBJECTIVE

 To effectively classify and predict the data.

 To decrease sparsity problem.

 To enhance the performance of the overall prediction results.

9
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
EXISTING SYSTEM

 HACKING incidents are increasing day by day as technology rolls out. A large number of
hacking incidents are reported by companies each year.
 The existing system doesn’t effectively classify and predict the attack which is presented in
the network.

10
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DISADVANTAGES

 Doesn’t Efficient for handling large volume of data.

 Theoritical Limits

 Incorrect Classification Results.

 Less Prediction Accuracy

11
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
PROPOSED SYSTEM

 The proposed model is introduced to overcome all the disadvantages that arises in the
existing system.
 This system will increase the accuracy of the classification results by classifying the data
based on the social network mental disorders and others using random forest classification
algorithm.
 It enhances the performance of the overall classification results.

12
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
ADVANTAGES

• High performance.
• Provide accurate prediction results.
• It avoid sparsity problems.
• Reduces the information Loss and the bias of the inference due to the multiple estimates.

13
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYSTEM REQUIREMENTS

Software Requirements

 Operating System : Windows 8.1


 Language : Python
 IDE : Anaconda - Spyder

14
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYSTEM REQUIREMENTS

Hardware Requirements
 Hard Disk : 1000 GB
 Monitor : 15 VGA color
 Mouse : Microsoft.
 Keyboard : 110 keys enhanced
 RAM : 4GB

15
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYSTEM ARCHITECTURE

TRAIN
TRAIN
FORMATTED
DATASET FORMATTED
DATSET CLASSIFICATION
DATASET DATSET CLASSIFICATION

TEST
TEST

PREDICTION
PREDICTION

16
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
FLOW DIAGRAM
START

SELECT DATSET

CLEANING DATSET

SPLIT TRAIN AND TEST

RANDOM FOREST
CLASSIFICATION

PREDICTION

17

A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Convolutional Neural
03/23/2024
Network
MODULES
 Data Selection and Loading

 Data Preprocessing

Splitting Dataset into Train and Test Data

 Feature Extraction

 Classification

 Prediction

 Result Generation

18
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
MODULES DESCRIPTION

19
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DATA SELECTION AND LOADING

 The data selection is the process of selecting the data for detecting the attacks.

 In this project, the KDDCUP dataset is used for detecting attacks.

 The dataset which contains the information about the duration, flag, service, src_bytes,
dest_bytes and class labels.

20
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DATA PREPROCESSING
 Data preprocessing is the process of removing the unwanted data from the dataset.

Missing data removal

Encoding Categorical data


 Missing data removal: In this process, the null values such as missing values are removed using
imputer library.
 Encoding Categorical data: That categorical data is defined as variables with a finite set of label
values. That most machine learning algorithms require numerical input and output variables. That an
integer and one hot encoding is used to convert categorical data to integer data.

21
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SPLITTING DATASET INTO TRAIN AND TEST
DATA
 Data splitting is the act of partitioning available data into. two portions, usually for cross-
validatory purposes.
 One. portion of the data is used to develop a predictive model. and the other to evaluate the
model's performance.
 Separating data into training and testing sets is an important part of evaluating data mining
models.
 Typically, when you separate a data set into a training set and testing set, most of the data is
used for training, and a smaller portion of the data is used for testing.
22
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
FEATURE EXTRACTION

• Feature scaling. Feature scaling is a method used to standardize the range of independent
variables or features of data. In data processing, it is also known as data normalization and is
generally performed during the data pre-processing step.
• Feature Scaling or Standardization: It is a step of Data Pre Processing which is applied to
independent variables or features of data. It basically helps to normalise the data within a
particular range. Sometimes, it also helps in speeding up the calculations in an algorithm.

23
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
CLASSIFICATION
 Classification is a process related to categorization, the process in which ideas and objects
are recognized, differentiated, and understood. In this project, the random forest
classification algorithm is used for classifying the data.
 Here Random Forest algorithm is used. “Random Forest” is a machine learning algorithm
which can be used for both classification and regression challenges. However, it is mostly
used in classification problems.
 Random forest (or random forests) is an ensemble classifier that consists of many decision
trees and outputs the class that is the mode of the class's output by individual trees.

24
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
PREDICTION

 It’s a process of predicting the attacks in the network from the dataset.
 This project will effectively predict the data from dataset by enhancing the
performance of the overall prediction results.

25
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
RESULT GENERATION
The Final Result will get generated based on the overall classification and prediction. The performance of this proposed approach is
evaluated using some measures like,
 True Positive
 True Negative
 False Positive
 False Negative
 Accuracy
 Precision
 Recall
 F1-Score

26
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
References

https://www.udemy.com/python-introduction/

27
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
Thank You…

28
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network

You might also like