Professional Documents
Culture Documents
UGC AUTONOMOUS
2
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYNOPSIS
Domain Introduction
Abstract
Introduction
Objectives
Existing System & Disadvantages
Proposed System & Advantages
System Requirements
System Architecture
Flow Diagram
Modules
Module Description
3
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DOMAIN INTRODUCTION
Data mining is the computing process of discovering patterns in large datasets involving
methods at the intersection of machine learning, statistics and database systems.
The overall goal of the data mining process is to extract information from a data set and
transform it into an understandable structure for further use.
Data mining is the analysis step of the "knowledge discovery in databases" process, or KDD.
A Network based Intrusion Detection System (NIDS) is usually placed at network points such
as a gateway and routers to check for intrusions in the network traffic.
Here Random Forest algorithm is used. “Random Forest” is a machine learning algorithm
which can be used for both classification and regression challenges. However, it is mostly
used in classification problems.
Random forest (or random forests) is an ensemble classifier that consists of many decision
trees and outputs the class that is the mode of the class's output by individual trees.
6
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
CONTINUE…
Random forests (RF) are a combination of tree predictors such that each tree depends on the
values of a random vector sampled independently and with the same distribution for all trees
in the forest.
The generalization error of a forest of tree classifiers depends on the strength of the
individual trees in the forest and the correlation between them.
This random forest classification and prediction algorithm will increase the performance of
the overall classification and prediction results.
7
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
INTRODUCTION
A detailed investigation and analysis of various machine learning techniques have been carried
out for finding the cause of problems associated with various machine learning techniques in
detecting intrusive activities.
Attack classification and mapping of the attack features is provided corresponding to each attack.
Issues which are related to detecting low-frequency attacks using network attack dataset are also
discussed and viable methods are suggested for improvement.
Machine learning techniques have been analyzed and compared in terms of their detection
capability for detecting the various category of attacks.
8
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
OBJECTIVE
9
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
EXISTING SYSTEM
HACKING incidents are increasing day by day as technology rolls out. A large number of
hacking incidents are reported by companies each year.
The existing system doesn’t effectively classify and predict the attack which is presented in
the network.
10
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DISADVANTAGES
Theoritical Limits
11
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
PROPOSED SYSTEM
The proposed model is introduced to overcome all the disadvantages that arises in the
existing system.
This system will increase the accuracy of the classification results by classifying the data
based on the social network mental disorders and others using random forest classification
algorithm.
It enhances the performance of the overall classification results.
12
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
ADVANTAGES
• High performance.
• Provide accurate prediction results.
• It avoid sparsity problems.
• Reduces the information Loss and the bias of the inference due to the multiple estimates.
13
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYSTEM REQUIREMENTS
Software Requirements
14
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYSTEM REQUIREMENTS
Hardware Requirements
Hard Disk : 1000 GB
Monitor : 15 VGA color
Mouse : Microsoft.
Keyboard : 110 keys enhanced
RAM : 4GB
15
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SYSTEM ARCHITECTURE
TRAIN
TRAIN
FORMATTED
DATASET FORMATTED
DATSET CLASSIFICATION
DATASET DATSET CLASSIFICATION
TEST
TEST
PREDICTION
PREDICTION
16
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
FLOW DIAGRAM
START
SELECT DATSET
CLEANING DATSET
RANDOM FOREST
CLASSIFICATION
PREDICTION
17
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Convolutional Neural
03/23/2024
Network
MODULES
Data Selection and Loading
Data Preprocessing
Feature Extraction
Classification
Prediction
Result Generation
18
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
MODULES DESCRIPTION
19
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DATA SELECTION AND LOADING
The data selection is the process of selecting the data for detecting the attacks.
The dataset which contains the information about the duration, flag, service, src_bytes,
dest_bytes and class labels.
20
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
DATA PREPROCESSING
Data preprocessing is the process of removing the unwanted data from the dataset.
21
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
SPLITTING DATASET INTO TRAIN AND TEST
DATA
Data splitting is the act of partitioning available data into. two portions, usually for cross-
validatory purposes.
One. portion of the data is used to develop a predictive model. and the other to evaluate the
model's performance.
Separating data into training and testing sets is an important part of evaluating data mining
models.
Typically, when you separate a data set into a training set and testing set, most of the data is
used for training, and a smaller portion of the data is used for testing.
22
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
FEATURE EXTRACTION
• Feature scaling. Feature scaling is a method used to standardize the range of independent
variables or features of data. In data processing, it is also known as data normalization and is
generally performed during the data pre-processing step.
• Feature Scaling or Standardization: It is a step of Data Pre Processing which is applied to
independent variables or features of data. It basically helps to normalise the data within a
particular range. Sometimes, it also helps in speeding up the calculations in an algorithm.
23
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
CLASSIFICATION
Classification is a process related to categorization, the process in which ideas and objects
are recognized, differentiated, and understood. In this project, the random forest
classification algorithm is used for classifying the data.
Here Random Forest algorithm is used. “Random Forest” is a machine learning algorithm
which can be used for both classification and regression challenges. However, it is mostly
used in classification problems.
Random forest (or random forests) is an ensemble classifier that consists of many decision
trees and outputs the class that is the mode of the class's output by individual trees.
24
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
PREDICTION
It’s a process of predicting the attacks in the network from the dataset.
This project will effectively predict the data from dataset by enhancing the
performance of the overall prediction results.
25
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
RESULT GENERATION
The Final Result will get generated based on the overall classification and prediction. The performance of this proposed approach is
evaluated using some measures like,
True Positive
True Negative
False Positive
False Negative
Accuracy
Precision
Recall
F1-Score
26
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
References
https://www.udemy.com/python-introduction/
27
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network
Thank You…
28
A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks using Con 03/23/2024
volutional Neural Network