SlideShare a Scribd company logo
1 of 28
Network Intrusion Detection
using
Supervised Machine Learning
Technique
with
Feature Selection
By :-
Jowin John Chemban
S7 CSE
Holy Grace Academy of Engineering
Intrusion
Intrusion is some time also called as hacker or
cracker attempting to break into or misuse your
system/network.
i.e., an intrusion attempt or a threat to be the
potential possibility of a deliberate unauthorized
attempt to
• Access information/resources
• Manipulate information
• Render a system unreliable or unusable.
Intrusion Detection System (IDS)
• Intrusion Detection is a set of techniques and methods
that are used to detect suspicious activity both at the
network and host level.
• An intrusion detection system (IDS) inspects all inbound
and outbound network activity and identifies suspicious
patterns that may indicate a network or system attack
from someone attempting to break into or compromise a
system/network.
• An IDS installed on a network provides much the same
purpose as a burglar alarm system installed in a house.
Through various methods, both detect when an
intruder/attacker/burglar is present, and both
subsequently issue some type of warning or alert.
Why Intrusion Detection System
• The wide spreading usages of internet and increases in
access to online contents, cybercrime is also happening at
an increasing rates.
• Intrusion detection is the first step to prevent security
attack.
• IDS detects attacks from a variety of systems and
network sources by collecting information and then
analyzes the information for possible security breaches.
• As the number of IoT devices and other smart devices
which are connected to network continue to multiply wildly,
so do the security issues associated with it.
Network Intrusion Detection System
• The network based IDS analyzes the data packets that
travel over a network and this analysis are carried out in
two ways,
 Signature based Network Intrusion Detection
 Anomaly based Network Intrusion Detection
• Till today anomaly based detection is far behind than the
detection that works based on signature and hence
anomaly based detection still remains a major area for
research.
No firewall is foolproof, and no network is
impenetrable.
Attackers continuously develop new
exploits and attack techniques designed to
circumvent your defenses. Many attacks
leverage other malware or social
engineering to obtain user credentials that
grant them access to your network and
data.
.
Why You Need Network IDS
• A network intrusion detection system (NIDS) is crucial
for network security because it enables you to detect and
respond to malicious traffic.
• The primary purpose of an intrusion detection system is to
ensure IT personnel is notified when an attack or network
intrusion might be taking place.
• The network IDS monitors network traffic and triggers
alerts when suspicious activity or known threats are
detected, so IT personnel can examine more closely and
take the appropriate steps to block or stop an attack
Why You Need Network IDS
Issues in Network IDS
• False Positives
Signature-based threat detection is generally accurate, but
when it comes to anomaly-based detection and identifying
potentially suspicious or malicious activity you will likely
encounter false positives.
• False Negatives
On the other side of the spectrum from false positives, you also
face a risk that suspicious or malicious activity will not be
detected 100% of the time. This is particularly an issue with
zero-day or emerging threats that rely on new exploits and
attack techniques that the IDS is unfamiliar with.
• Security Experts
With a network IDS, the biggest challenge—aside from false
negatives and false positives—can be the sheer volume of
alerts. One of the most important elements of using a network
intrusion detection system effectively is ensuring you have IT
security personnel with the knowledge and skills.
Machine Learning Principles
in
Network Intrusion Detection
SYSTEM Model
• The system proposed is composed of
– feature selection and
– learning algorithm.
• Feature selection component are responsible to extract
most relevant features or attributes to identify the
instance to a particular group or class.
• Learning algorithm component builds the necessary
intelligence or knowledge using the result found from the
feature selection component.
• Using the training dataset, the model gets trained and
builds its intelligence.
• The learned intelligences are applied to the testing
dataset to measure the accuracy of home much the model
correctly classified on unseen data.
SYSTEM Model
Feature Selection
• Used to reduce the reduce data dimensionality in machine
learning.
• Two methods,
 Filter method
 Wrapper method
• Filter method
– Features are selected on the basis of their scores in
various statistical tests that measure the relevance of
features by their correlation with dependent variable
or outcome variable. The filter method uses an
attribute evaluator along with a ranker to rank all the
features in the dataset.
• Wrapper method
– Wrapper methods are based on greedy search
algorithms as they evaluate all possible combinations of
the features and select the combination that produces
the best result for a specific machine learning
algorithm.
Wrapper method is useful for machine learning test whereas
filter method is suitable for data mining test because data
mining has thousands of millions of features.
Support Vector Machine (SVM)
• SVM is a supervised algorithm that classifies cases by
finding a separator.
1. Mapping data to a high-dimensional feature space.
2. Finding a separator
wTx+b=-1
wTx+b=0
wTx+b=-1
Artificial Neural Network (ANN)
• ANN is another tool used in Machine Learning.
• System inspired by human brain system and replicate the
learning system of human brain.
• Consists of input and output layers with one or more
hidden layers.
• The ANN uses a technique called back propagation to
adjust the outcome with the expected result or class.
ExperimentalAnalysis
ofthe
System
Feature Selection
• Experiment carried out using WEKHA open source
software suite.
– In first part, extracted relevant features using different feature
selection methods.
– In wrapper method, SVM classification algorithm with cross-
validation to avoid over fitting and under fitting problem.
– In the filter method, A ranker algorithm used to find the best
result suitable for the proposed classifier.
• Training Data used = NSL-KDD dataset with 25,191
instances.
FS
Technique
FS Type
Input
Features
Output
Features
Correlation Based
Wrapper 41 17
Chi-Square Based
Filter 41 35
Classification
• Classification using supervised machine learning requires
training the model using training dataset.
• To training the model we used SVM and ANN learning
algorithms for each feature selection methods.
• Next, these models were evaluated using 22,542
instances of testing data from NSL-KDD testing dataset.
Learning Type Number of
Features
Detection
Accuracy
SVM 17 81.78%
SVM 35 82.34%
ANN 17 94.02%
ANN 35 83.68%
Learning
Type
Our Model
Accuracy
Existing Models
Accuracy
SVM 82.34% 69.52% 92.84%
ANN 94.02% 77.23% 81.2%
Final Result
• The detection success rate of the proposed model is also
compared with other existing models.
• After several trial and error methods, found the best
detection rate with 3 hidden layers and 0.1 learning rate.
Conclusion
• We have presented different machine learning models
using different machine learning algorithms and different
feature selection methods to find a best model.
• The analysis of the result shows that the model built using
ANN and wrapper feature selection outperformed all
other models in classifying network traffic correctly with
detection rate of 94.02%.
• The intrusion detection system exist today can only
detect known attacks. Detecting new attacks or zero day
attack still remains a research topic due to the high false
positive rate of the existing systems.
References
• ieeexplore.ieee.org
• www.cloudflare.com
• www.forbes.com
• www.cisco.com
• blog.alertlogic.com
• searchsecurity.techtarget.com
• www.comparitech.com
• www.websitehostingrating.com
• www.stackabuse.com
• https://youtu.be/iBsGSsbDMyw
Seminar Presentation | Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection

More Related Content

What's hot

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
Machine learning ppt.
Machine learning ppt.Machine learning ppt.
Machine learning ppt.ASHOK KUMAR
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Neural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionNeural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionVipra Singh
 
Types of Machine Learning
Types of Machine LearningTypes of Machine Learning
Types of Machine LearningSamra Shahzadi
 
Ensemble learning
Ensemble learningEnsemble learning
Ensemble learningHaris Jamil
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 

What's hot (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Machine learning ppt.
Machine learning ppt.Machine learning ppt.
Machine learning ppt.
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Neural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionNeural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
 
Types of Machine Learning
Types of Machine LearningTypes of Machine Learning
Types of Machine Learning
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Ensemble learning
Ensemble learningEnsemble learning
Ensemble learning
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 

Similar to Seminar Presentation | Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection

malware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectmalware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectNaveenAd4
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesVahid Farrahi
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...IJAAS Team
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityKhaled Al-Khalili
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLSiva krishnam raju Patsamatla
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 

Similar to Seminar Presentation | Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection (20)

012
012012
012
 
malware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectmalware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year project
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision trees
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Seminar Presentation | Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection

  • 1. Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection By :- Jowin John Chemban S7 CSE Holy Grace Academy of Engineering
  • 2. Intrusion Intrusion is some time also called as hacker or cracker attempting to break into or misuse your system/network. i.e., an intrusion attempt or a threat to be the potential possibility of a deliberate unauthorized attempt to • Access information/resources • Manipulate information • Render a system unreliable or unusable.
  • 3. Intrusion Detection System (IDS) • Intrusion Detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level. • An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system/network. • An IDS installed on a network provides much the same purpose as a burglar alarm system installed in a house. Through various methods, both detect when an intruder/attacker/burglar is present, and both subsequently issue some type of warning or alert.
  • 4. Why Intrusion Detection System • The wide spreading usages of internet and increases in access to online contents, cybercrime is also happening at an increasing rates. • Intrusion detection is the first step to prevent security attack. • IDS detects attacks from a variety of systems and network sources by collecting information and then analyzes the information for possible security breaches. • As the number of IoT devices and other smart devices which are connected to network continue to multiply wildly, so do the security issues associated with it.
  • 5.
  • 6. Network Intrusion Detection System • The network based IDS analyzes the data packets that travel over a network and this analysis are carried out in two ways,  Signature based Network Intrusion Detection  Anomaly based Network Intrusion Detection • Till today anomaly based detection is far behind than the detection that works based on signature and hence anomaly based detection still remains a major area for research.
  • 7. No firewall is foolproof, and no network is impenetrable. Attackers continuously develop new exploits and attack techniques designed to circumvent your defenses. Many attacks leverage other malware or social engineering to obtain user credentials that grant them access to your network and data. . Why You Need Network IDS
  • 8. • A network intrusion detection system (NIDS) is crucial for network security because it enables you to detect and respond to malicious traffic. • The primary purpose of an intrusion detection system is to ensure IT personnel is notified when an attack or network intrusion might be taking place. • The network IDS monitors network traffic and triggers alerts when suspicious activity or known threats are detected, so IT personnel can examine more closely and take the appropriate steps to block or stop an attack Why You Need Network IDS
  • 9.
  • 10.
  • 11. Issues in Network IDS • False Positives Signature-based threat detection is generally accurate, but when it comes to anomaly-based detection and identifying potentially suspicious or malicious activity you will likely encounter false positives. • False Negatives On the other side of the spectrum from false positives, you also face a risk that suspicious or malicious activity will not be detected 100% of the time. This is particularly an issue with zero-day or emerging threats that rely on new exploits and attack techniques that the IDS is unfamiliar with. • Security Experts With a network IDS, the biggest challenge—aside from false negatives and false positives—can be the sheer volume of alerts. One of the most important elements of using a network intrusion detection system effectively is ensuring you have IT security personnel with the knowledge and skills.
  • 14. • The system proposed is composed of – feature selection and – learning algorithm. • Feature selection component are responsible to extract most relevant features or attributes to identify the instance to a particular group or class. • Learning algorithm component builds the necessary intelligence or knowledge using the result found from the feature selection component. • Using the training dataset, the model gets trained and builds its intelligence. • The learned intelligences are applied to the testing dataset to measure the accuracy of home much the model correctly classified on unseen data. SYSTEM Model
  • 15. Feature Selection • Used to reduce the reduce data dimensionality in machine learning. • Two methods,  Filter method  Wrapper method
  • 16. • Filter method – Features are selected on the basis of their scores in various statistical tests that measure the relevance of features by their correlation with dependent variable or outcome variable. The filter method uses an attribute evaluator along with a ranker to rank all the features in the dataset. • Wrapper method – Wrapper methods are based on greedy search algorithms as they evaluate all possible combinations of the features and select the combination that produces the best result for a specific machine learning algorithm. Wrapper method is useful for machine learning test whereas filter method is suitable for data mining test because data mining has thousands of millions of features.
  • 17. Support Vector Machine (SVM) • SVM is a supervised algorithm that classifies cases by finding a separator. 1. Mapping data to a high-dimensional feature space. 2. Finding a separator
  • 19.
  • 20. Artificial Neural Network (ANN) • ANN is another tool used in Machine Learning. • System inspired by human brain system and replicate the learning system of human brain. • Consists of input and output layers with one or more hidden layers. • The ANN uses a technique called back propagation to adjust the outcome with the expected result or class.
  • 21.
  • 23. Feature Selection • Experiment carried out using WEKHA open source software suite. – In first part, extracted relevant features using different feature selection methods. – In wrapper method, SVM classification algorithm with cross- validation to avoid over fitting and under fitting problem. – In the filter method, A ranker algorithm used to find the best result suitable for the proposed classifier. • Training Data used = NSL-KDD dataset with 25,191 instances. FS Technique FS Type Input Features Output Features Correlation Based Wrapper 41 17 Chi-Square Based Filter 41 35
  • 24. Classification • Classification using supervised machine learning requires training the model using training dataset. • To training the model we used SVM and ANN learning algorithms for each feature selection methods. • Next, these models were evaluated using 22,542 instances of testing data from NSL-KDD testing dataset. Learning Type Number of Features Detection Accuracy SVM 17 81.78% SVM 35 82.34% ANN 17 94.02% ANN 35 83.68%
  • 25. Learning Type Our Model Accuracy Existing Models Accuracy SVM 82.34% 69.52% 92.84% ANN 94.02% 77.23% 81.2% Final Result • The detection success rate of the proposed model is also compared with other existing models. • After several trial and error methods, found the best detection rate with 3 hidden layers and 0.1 learning rate.
  • 26. Conclusion • We have presented different machine learning models using different machine learning algorithms and different feature selection methods to find a best model. • The analysis of the result shows that the model built using ANN and wrapper feature selection outperformed all other models in classifying network traffic correctly with detection rate of 94.02%. • The intrusion detection system exist today can only detect known attacks. Detecting new attacks or zero day attack still remains a research topic due to the high false positive rate of the existing systems.
  • 27. References • ieeexplore.ieee.org • www.cloudflare.com • www.forbes.com • www.cisco.com • blog.alertlogic.com • searchsecurity.techtarget.com • www.comparitech.com • www.websitehostingrating.com • www.stackabuse.com • https://youtu.be/iBsGSsbDMyw

Editor's Notes

  1. Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection By: Jowin John Chemban (jowinchemban@gmail.com) HGW16CS022 (2016-2020 Batch) S7 B.Tech Computer Science Engineering Holy Grace Academy of Engineering, Mala
  2. Thank You