GithubHelp home page GithubHelp logo

oliviagallucci / ids-aiml Goto Github PK

View Code? Open in Web Editor NEW
9.0 2.0 0.0 24.42 MB

🕵️ IDS with accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection

Home Page: https://oliviagallucci.com/ids-security-using-decision-trees-and-neural-networks/

License: MIT License

Makefile 9.01% Python 90.99%
artificial-intelligence artificial-neural-networks decision-trees defensive-security ids intrusion-detection intrusion-detection-system machine-learning network-analysis

ids-aiml's Introduction

ids-aiml 🕵️

Detective GIF

An IDS designed to detect network attacks using decision trees and neural networks.

GitHub MIT license Python Github-sponsors

Project Overview

This GitHub repository contains the code and documentation for an Intrusion Detection System (IDS) developed by Derek Chan and Olivia Gallucci under the supervision of Dr. Leon Reznik. The IDS is designed to detect network attacks using decision trees and neural networks.

Usage Steps

Step 1: Clone the Repository

Clone this GitHub repository to your local machine:

git clone https://github.com/your-username/ids-aiml

Step 2: Navigate to the Project Directory

cd ids-aiml

Step 3: Explore the Project Structure

Take a moment to explore the project structure as well as the Weka user guide. Read the steps in the "Data preparation" and "Operation" sections to know how we preprocessed the data using the provided Python script (preprocessing.py).

Step 4: Set Up Environment

Ensure you have Python installed along with the required libraries (pandas, numpy, sklearn, concurrent.futures). Weka is also required for the neural network module.

Step 5: Misuse IDS

Design

  • Use the provided Python script for misuse IDS (misuse_ids.py).
  • Adjust parameters based on your requirements.

Operation

  • Run the script to train and test the misuse IDS.
  • Review the generated results and metrics.

Step 6: Anomaly IDS

Design

  • Utilize the provided Python script for anomaly IDS (anomaly_ids.py).
  • Adjust parameters as needed.

Operation

  • Execute the script to train and test the anomaly IDS.
  • Examine the results and metrics.

Step 7: Neural Network

Design

  • Refer to the Weka user guide for loading and preprocessing data for neural network training.
  • Set hyperparameters for the Multilayer Perceptron (MLP) as described in the README.

Operation

  • Use Weka Explorer to train and test the MLP neural network.
  • Evaluate the model's performance based on accuracy and other metrics.

Step 8: Data Analysis with Weka

Step 9: Tests and Results

  • Explore the provided test results for the IDS systems, including accuracy, training time, and memory footprint.

Additional Information

For any questions or issues, please feel free to reach out to the project contributors listed in the README. Thank you for your interest in our intrusion detection system project!

Releases

  • 1.0.0-alpha - testing is done by developers only

Acknowledgements

Warranty

MIT

The creator(s) of this tool provides no warranty or assurance regarding its performance, dependability, or suitability for any specific purpose.

The tool is furnished on an "as is" basis without any form of warranty, whether express or implied, encompassing, but not limited to, implied warranties of merchantability, fitness for a particular purpose, or non-infringement.

The user assumes full responsibility for employing this tool and does so at their own peril. The creator(s) holds no accountability for any loss, damage, or expenses sustained by the user or any third party due to the utilization of this tool, whether in a direct or indirect manner.

Moreover, the creator(s) explicitly renounces any liability or responsibility for the accuracy, substance, or availability of information acquired through the use of this tool, as well as for any harm inflicted by viruses, malware, or other malicious components that may infiltrate the user's system as a result of employing this tool.

By utilizing this tool, the user acknowledges that they have perused and understood this warranty declaration and agree to undertake all risks linked to its utilization.

License

This project is licensed under the MIT License - see the LICENSE.md file for details

ids-aiml's People

Contributors

oliviagallucci avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.