Anomaly and intrusion detection systems

Assignment Help Computer Engineering
Reference no: EM131242948

Project Assignment: Computer Security

Overview

As computers and the Internet become increasingly popular, malicious activities in the cyberspace have increased significantly. Intrusion detection is an area of computer security that focuses on detecting these attacks reliably. Intrusion detection systems (IDS) usually have a knowledge base containing rules that characterize attacks. Building such knowledge base manually can be time consuming. Machine learning can help build such knowledge base in a more efficient manner. In order to detect attacks, we need to differentiate between instances of normal and attack behavior. Based on previous instances of normal and attack behavior, a machine learning algorithm can gain the knowledge on how to differentiate between the two types of behavior and represent the knowledge in a form than can be used to predict if current instances are malicious or not.

Objectives

This project aims to apply machine learning techniques for detecting attacks/intrusions. More specifically, the objectives are:

- machine learning can be achieved from historical data (experience)
- machine learning algorithms can be applied to computer security
- understanding the learning task of trying to detect attacks
- understanding a decision-tree learning algorithm
- a better understanding of search and knowledge representation
- evaluation of machine learning algorithms

Project Description

Over the last decade, malicious activities in the cyberspace have increased significantly. Intrusion detection is an area of computer security that focuses on detecting these attacks reliably. Intrusion detection systems (IDS) usually have a knowledge base containing rules that characterize attacks. Building such knowledge base manually can be time consuming. Machine learning can help build such a knowledge base in a more efficient manner.

In order to detect attacks, we need to differentiate between instances of normal and attack behavior. Based on previous instances of normal and attack behavior, a machine learning algorithm can gain the knowledge on how to differentiate between the two types of behavior and represent the knowledge in a form than can be used to predict if current instances are malicious or not.

For this project, you will need to implement1 the following decision-tree learning algorithm (also found in Russell and Norvig's book "Artificial Intelligence, A Modern Approach"):

function DECISION-TREE-LEARNINC;(examp/es, attributes, default) returns a decision tree

inputs: examples, set of examples

attributes, set of attributes

default, default value for the goal predicate

if examples is empty then return default

else if all examples have the same classification then return the classification

else if attributes is empty

then return NIAJoRITY-VALuE(exampies)

else

best ← CHOOSE- ATTRiBuTE(attributes, examples)

tree a new decision tree with root test best

for each value v, of best do

examples, {elements of examples with best = v,} subtree DECISION-TREE-LEARNINC;(exampies)) add a branch to tree with label v, and subtree subtree

end

return tree

You will then evaluate the accuracy of the algorithm on the provided training and test sets (described below).

1. Input to your program:
o file name of the attribute description,
o file name of the training set, and
o file name of the test set.

2. Output from your program:
o the tree using pre-order traversal with more indentation for nodes at deeper levels,
o accuracy of the tree on the training set, and
o accuracy of the tree on the (unseen) test set.

IDS Data Set

The IDS data set contains records of network activities that are normal or part of a denial of service (DOS) attack(s) called Neptune (aka SYN-flood). Neptune tries to make many "half" connections to a server. Due to limited resources, a server usually has a maximum number of connections that it can handle. Many malicious "half" connections can prevent legitimate connections to be made. That is, the server might be filled with useless "half" connections, and cannot accept legitimate connections and provide the intended service (hence "denial of service"). The provided data set is adapted from the much larger KDD Cup Data set (https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html). All values in the data set have been converted into discrete values.

Files for the data set:

- Attribute description: ids-attr.txt
- Training set: ids-train.txt (800 records)
- Test set: ids-test.txt (200 records)

Submission

For this assignment, you must submit the following:

1. Source code of your program

2. Executable of your program (runnable in either Windows or Unix)

3. Output from running your program with the provided data set.

4. Report (2-3 pages) that includes a discussion of your experiences creating decision-tree learning software, and in general, with the decision-tree learner in terms of the inputs, outputs, and performance.

Reference no: EM131242948

Questions Cloud

Describe style of leadership this decision reflects : Describe which framework the opponents of this move would use to support their statement that it be considered unethical. Describe style of leadership this decision reflects, and discuss whether this move would lead to a positive evaluation of lead..
Acceptable to post comments anonymously : Do you feel its acceptable to post comments anonymously, or do you think people should include their names? why or why not?
Find needed suction pressure that will lead to critical flow : Find the needed suction pressure that will lead to critical flow in the nozzle, the mass flow rate, and the blower work, assuming the blower exit is at atmospheric pressure, 100 kPa.
Probability of tripling investment : An investor is considering two alternatives for which she has Rs. 1,00,000 to invest. The first is commercial property; the second is stocks. Analysis has revealed that the property alternative offers a 0.50 probability of tripling her investment ..
Anomaly and intrusion detection systems : CSC 7210 - Anomaly and Intrusion Detection Systems Executable of your program (runnable in either Windows or Unix) and Output from running your program with the provided data set - You will then evaluate the accuracy of the algorithm on the provided ..
Same systems and policies everywhere they operate : Wal-Mart operated stores in both the US and Mexico. While Wal-Mart would like to maintain the same systems and policies everywhere they operate, culture creates some differences.
Determine the mass flow rate in the pipeline : The pressure drop across the orifice is 15 kPa, and the coefficient of discharge is 0.62. Determine the mass flow rate in the pipeline.
How public order crime can have a negative impact on society : Instead, they are crimes that threaten society in general. Give one example of a public order crime and how it can have a negative impact on society.
Etermine the pressure and temperature leaving the diffuser : Consider the inlet diffuser of the engine, where air leaves with a velocity of 100 m/s. Determine the pressure and temperature leaving the diffuser and the ratio of inlet to exit area of the diffuser, assuming the flow to be reversible and adiabat..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd