Anomaly and intrusion detection systems

Assignment Help Computer Engineering
Reference no: EM131242948

Project Assignment: Computer Security

Overview

As computers and the Internet become increasingly popular, malicious activities in the cyberspace have increased significantly. Intrusion detection is an area of computer security that focuses on detecting these attacks reliably. Intrusion detection systems (IDS) usually have a knowledge base containing rules that characterize attacks. Building such knowledge base manually can be time consuming. Machine learning can help build such knowledge base in a more efficient manner. In order to detect attacks, we need to differentiate between instances of normal and attack behavior. Based on previous instances of normal and attack behavior, a machine learning algorithm can gain the knowledge on how to differentiate between the two types of behavior and represent the knowledge in a form than can be used to predict if current instances are malicious or not.

Objectives

This project aims to apply machine learning techniques for detecting attacks/intrusions. More specifically, the objectives are:

- machine learning can be achieved from historical data (experience)
- machine learning algorithms can be applied to computer security
- understanding the learning task of trying to detect attacks
- understanding a decision-tree learning algorithm
- a better understanding of search and knowledge representation
- evaluation of machine learning algorithms

Project Description

Over the last decade, malicious activities in the cyberspace have increased significantly. Intrusion detection is an area of computer security that focuses on detecting these attacks reliably. Intrusion detection systems (IDS) usually have a knowledge base containing rules that characterize attacks. Building such knowledge base manually can be time consuming. Machine learning can help build such a knowledge base in a more efficient manner.

In order to detect attacks, we need to differentiate between instances of normal and attack behavior. Based on previous instances of normal and attack behavior, a machine learning algorithm can gain the knowledge on how to differentiate between the two types of behavior and represent the knowledge in a form than can be used to predict if current instances are malicious or not.

For this project, you will need to implement1 the following decision-tree learning algorithm (also found in Russell and Norvig's book "Artificial Intelligence, A Modern Approach"):

function DECISION-TREE-LEARNINC;(examp/es, attributes, default) returns a decision tree

inputs: examples, set of examples

attributes, set of attributes

default, default value for the goal predicate

if examples is empty then return default

else if all examples have the same classification then return the classification

else if attributes is empty

then return NIAJoRITY-VALuE(exampies)

else

best ← CHOOSE- ATTRiBuTE(attributes, examples)

tree a new decision tree with root test best

for each value v, of best do

examples, {elements of examples with best = v,} subtree DECISION-TREE-LEARNINC;(exampies)) add a branch to tree with label v, and subtree subtree

end

return tree

You will then evaluate the accuracy of the algorithm on the provided training and test sets (described below).

1. Input to your program:
o file name of the attribute description,
o file name of the training set, and
o file name of the test set.

2. Output from your program:
o the tree using pre-order traversal with more indentation for nodes at deeper levels,
o accuracy of the tree on the training set, and
o accuracy of the tree on the (unseen) test set.

IDS Data Set

The IDS data set contains records of network activities that are normal or part of a denial of service (DOS) attack(s) called Neptune (aka SYN-flood). Neptune tries to make many "half" connections to a server. Due to limited resources, a server usually has a maximum number of connections that it can handle. Many malicious "half" connections can prevent legitimate connections to be made. That is, the server might be filled with useless "half" connections, and cannot accept legitimate connections and provide the intended service (hence "denial of service"). The provided data set is adapted from the much larger KDD Cup Data set (https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html). All values in the data set have been converted into discrete values.

Files for the data set:

- Attribute description: ids-attr.txt
- Training set: ids-train.txt (800 records)
- Test set: ids-test.txt (200 records)

Submission

For this assignment, you must submit the following:

1. Source code of your program

2. Executable of your program (runnable in either Windows or Unix)

3. Output from running your program with the provided data set.

4. Report (2-3 pages) that includes a discussion of your experiences creating decision-tree learning software, and in general, with the decision-tree learner in terms of the inputs, outputs, and performance.

Reference no: EM131242948

Questions Cloud

Describe style of leadership this decision reflects : Describe which framework the opponents of this move would use to support their statement that it be considered unethical. Describe style of leadership this decision reflects, and discuss whether this move would lead to a positive evaluation of lead..
Acceptable to post comments anonymously : Do you feel its acceptable to post comments anonymously, or do you think people should include their names? why or why not?
Find needed suction pressure that will lead to critical flow : Find the needed suction pressure that will lead to critical flow in the nozzle, the mass flow rate, and the blower work, assuming the blower exit is at atmospheric pressure, 100 kPa.
Probability of tripling investment : An investor is considering two alternatives for which she has Rs. 1,00,000 to invest. The first is commercial property; the second is stocks. Analysis has revealed that the property alternative offers a 0.50 probability of tripling her investment ..
Anomaly and intrusion detection systems : CSC 7210 - Anomaly and Intrusion Detection Systems Executable of your program (runnable in either Windows or Unix) and Output from running your program with the provided data set - You will then evaluate the accuracy of the algorithm on the provided ..
Same systems and policies everywhere they operate : Wal-Mart operated stores in both the US and Mexico. While Wal-Mart would like to maintain the same systems and policies everywhere they operate, culture creates some differences.
Determine the mass flow rate in the pipeline : The pressure drop across the orifice is 15 kPa, and the coefficient of discharge is 0.62. Determine the mass flow rate in the pipeline.
How public order crime can have a negative impact on society : Instead, they are crimes that threaten society in general. Give one example of a public order crime and how it can have a negative impact on society.
Etermine the pressure and temperature leaving the diffuser : Consider the inlet diffuser of the engine, where air leaves with a velocity of 100 m/s. Determine the pressure and temperature leaving the diffuser and the ratio of inlet to exit area of the diffuser, assuming the flow to be reversible and adiabat..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Plan the diagram using visio or word

You would develop the entity relationship diagram (ERD) for your project database based on the initial data requirements.

  Design a turing machine which accepts the language

Design a Turing machine which accepts the language {uu^R | u ? {a, b}*} , where u^R is u in reverse order. Include an explanation, a diagram and a table.

  Write down an algorithm that returns the smallest value

Write down an algorithm that outputs the smallest and second smallest values in array.

  Spanning-tree and etherchannel

Discuss what you did in this lab and what you will cover in the lab report. Provide some background information on the main idea in this lab and discuss the purpose of the lab activity.

  Explain the key reasons that following a support strategy

system support is one of the key areas for the success of any system integration. using the library and internet

  Construct an e-r diagram for the registrars office

Construct an E-R diagram for the registrar's office. Document all assumptions that you make about the mapping constraints.

  Calculate the differential input impedance

Calculate the differential input impedance - Calculate CMRR when the internal resistance of the current source is set to REE?

  Main window with a game menu

Change your code so that when the purchase button is pressed, a dialog box appears to allow the user to enter purchasing information and to confirm the purchase.

  Show the current selections made by the user

construct a program that demonstrates the enhanced options for the MessageBox class. Use three GroupBox controls with RadioButton controls contained within each.

  Consider a processor with a delayed branch that has three

consider a processor with a delayed branch that has three delay slots. three compilers compiler a compiler b and

  What is the network

explain the main types of networks.

  Would this proposed solution meet the requirements

Your company has just occupied an old historic building in which 15 employees will work. because of historic building codes, the company is not permitted to run cables inside walls or ceilings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd