Attack classification using naïve bayes algorithm

Assignment Help Other Subject
Reference no: EM132489029

Security and Privacy Issues in Analytics

Pass Task 1: Attack Classification using Naïve Bayes Algorithm

Overview

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. Supervised learning techniques have been proven very effective for intrusion detection.

Task Description

Instructions:

This task is a binary classification (2-class problem). Follow the below steps to complete the task. Once you have the results and reports, compile in a PDF.

1. Load the train dataset (of the NSL-KDD data) from the files KDDTrain, KDDTest:

Once uploaded, you may check the data distribution by selecting the class attribute and it will appear as Figure 1.

2. Now apply "Naïve Bayes" classification algorithm from the "Classify" tab.

3. Check the results with a 10-fold cross validation.

4. Now, upload the test dataset and check the classification results.

5. Compare the results between 10-fold cross validation and the one obtained using the test dataset. Use confusion matrix to explain the results. Also, include a brief description on 10-fold cross validation.

Pass Task 2: Intrusion Detection using Supervised Learning Techniques

Task Description

Instructions:
This task is a binary classification. Follow the below steps to complete the task. Once you have the results and reports, compile in a PDF and submit it.

Load the train dataset (of the NSL-KDD data) from the files KDDTrain, KDDTest.

Once uploaded, you may check the data distribution by selecting the class attribute and it will appear as Figure 1.

2. Now apply "Naïve Bayes" classification algorithm from the "Classify" tab.

3. Check the results with a 10-fold cross validation.

4. Now, upload the test dataset and check the classification results.

5. Compare the results between 10-fold cross validation and the one obtained using the test dataset. Use confusion matrix to explain the results. Also, include a brief description on 10-fold cross validation.

*The above 5-steps are similar to the pass task 1. Therefore you can use the results from there while preparing this report. Address carefully the below.

6. Similar to the "Naïve Bayes", apply at least 5 other supervised classification techniques and compare their performance. To report the performance create a table and present the following measures. Then compare the outcome of your nominated 5 algorithms. You can choose any 5. However try to consider high performing algorithms.

• TP Rate
• FP Rate
• Precision
• Recall
• F-Measure
• ROC Area

7. Some algorithms may have tuning parameter. Consider the SMO based SVM algorithm. You can try different kernel trick as shown below. Change the kernels to "PolyKernel" and ensure that the filter normalize the training data as shown in the figure. If you start the task, it will take too much time on this large dataset. So you need to reduce the sample size of the dataset to make it manageable (note: it may impact on the performance).

8. Now perform classification task based on SVM classifier (SMO) using POLY and RBF kernels and report the confusion matrices and computation time.

Pass Task 3: Taxonomy of Attacks, Defenses, and Consequences in Adversarial Machine Learning

Task Description

Suppose you are working in an organization who are developing a report on the vulnerabilities of machine learning models due to adversarial attacks. Your manager has asked you to provide a 600 word report to submit within the next week. His expectation is that the 600 word report will cover the attack taxonomies, defense mechanisms and consequences.
2. Read the NIST article
3. Identify five important attack types. Summarize in approx. 300 words.
Summarize the defense mechanisms for the attack types you identified in step 1.

Attachment:- Security and Privacy Issues in Analytics.rar

Reference no: EM132489029

Questions Cloud

Examine the relationship between systems and behavior : Systems thinking in public health examines the relationship between systems and behavior. What is an example of a system in public health? How does this system.
What is the weighted average maturity of the assets : What is the weighted average maturity of the assets of the FI? What is the weighted average maturity of the liabilities of the FI?
What is the primary public health interest in the example : There are issues in public health that pose ethical dilemmas because it is necessary to weigh the concerns of both the individual and the community.
How would you handle employee concerns about the ratings : After reading Case Study 7-2: Implementing an Appeals Process at Accounting, Inc, design an appeals process to handle employee complaints about the newly.
Attack classification using naïve bayes algorithm : Attack Classification using Naïve Bayes Algorithm Compare the results between 10-fold cross validation and the one obtained using the test dataset
Find economic stability : Should employers be free to respond with their own safety measures before we know more about the virus and find economic stability?
Explain the difference between debt versus equity investment : Explain the differences between debt versus equity investments. They also wish to learn more about the various types of investments reported.
What is the accounting treatment for the company : What is the accounting treatment for the company you've purchased? if the company an asset? or an expense? Cash will be credited 125,000.
What process his creditors will have to go through : Also advise James as to what process his creditors will have to go through in order to have him declared bankrupt.

Reviews

Write a Review

Other Subject Questions & Answers

  Comparison and contrast of the following two

comparison and contrast of the following two storiesnbspnbspexplore the similarities andor differences between the two

  Criminal proceedings

Which Supreme Court era is remembered for its concern with protecting the innocent against massive power of the state in criminal proceedings?

  Create training schedules to achieve specific goals

Create training schedules to allow the nursing staff time to learn the new laboratory process. The receptionists will need to be trained to identify which patients will be using the new laboratory and the standard process.

  Identify three specific impacts of social factors

Write a three-page essay detailing how healthcare providers and/or members of a healthcare ethics committee can impact change in these areas .

  Elements of design-during the process of envisioning

During the process of envisioning and designing a film, the director, production designer, and art director (in collaboration with the cinematographer) are concerned with several major spatial and temporal elements.

  Describe a criminal behavior in detail

Describe a criminal behavior in detail addressing how multicultural characteristics might influence the behavior as well as perceptions of the behavior by society. Define all relevant typologies or categories that pertain to your selected criminal ..

  Explain whether each stakeholders needs desires and goals

each stakeholder in the selection process - line managers coworkers and applicants - has distinctly different needs

  Discuss your views of that particular film

Choose a film that you have seen recently, and which you particularly enjoyed. Discuss your views of that particular film

  Contracts analysis response to a provided scenario

The student will complete a Contracts Analysis of at least 1,000 words in response to a provided scenario. The assignment must include at least 3 scholarly sources other than the course textbook/materials and conform to current APA format.

  Practice of planting evidence or holding back evidence

Suppose you are a police officer appointed to the drug task force. Planning the principle of ethical egoism take a position for or against practice of planting evidence or holding back evidence to help ensure the conviction of a known drug trafficker..

  Identify the purpose of the evaluation

To ensure the success of a program evaluation, a social worker must generate a specific detailed plan. That plan should describe the goal of the evaluation.

  Define ethical principles of psychologists

Prior to beginning work on this discussion, read the webpage for the Behavior Analyst Certification Board (BACB), the Harvey, Luiselli, & Wong, (2009) article.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd