GrannyProgramming/Intrusion-Detection-using-Deep-Learning-and-Machine-Learning
Network related services, programs and applications are developing greatly, however, network security breaches are also developing with them. Network security is an evolving, challenging and a critical task. It is essential that there is a system in place to identify any harmful movement happening in network. An Intrusion detection system (IDS) has become the prerequisite software addressing cyber security in the modern era. Especially, with the greater complexity of advanced cyber-attacks and as such the uncertainty surrounding the detection of the types of attacks. This thesis proposes a novel approach using an ensemble of K-Means and Gaussian Mixture clustering combined with a deep neural network (DNN) algorithm. When compared with traditional artificial neural network’s (ANN’s) used within an IDS, our approach implements modern advances in deep learning such as initialising the parameters through the unsupervised pre-training clustering ensemble, therefore improving the detection accuracy. We hope our results will show that the proposed approach can provide a real-time response to the attack with a greatly increased detection ratio for false flags.
Jupyter NotebookMIT
Issues
- 0
Gathering Resources and Tagging
#10 opened by GrannyProgramming - 0
- 0
2.10 Related Works
#34 opened by GrannyProgramming - 0
2.6 Machine Learning
#30 opened by GrannyProgramming - 0
- 0
2.8 Deep Learning
#32 opened by GrannyProgramming - 0
- 0
Chapter2
#19 opened by GrannyProgramming - 0
2.2 Intrusion Detection Systems
#25 opened by GrannyProgramming - 0
2.5 IDS Challenges
#28 opened by GrannyProgramming - 0
- 0
Explore Dataset
#3 opened by GrannyProgramming - 0
2.3 IDS definition
#26 opened by GrannyProgramming - 0
2.1 Introduction
#24 opened by GrannyProgramming - 0
Proof read Chapter1
#18 opened by GrannyProgramming - 0
Chapter1
#13 opened by GrannyProgramming - 0
DOER hand in
#14 opened by GrannyProgramming - 1
Preliminary Work
#8 opened by GrannyProgramming - 0
Explore DNN
#6 opened by GrannyProgramming - 0
Explore SVM ensemble
#5 opened by GrannyProgramming - 0
Outline
#17 opened by GrannyProgramming - 0
Word the problem statement
#4 opened by GrannyProgramming - 0
Motivation section
#16 opened by GrannyProgramming - 0
IDS Challenges
#29 opened by GrannyProgramming - 0
Chapter6
#23 opened by GrannyProgramming - 0
Chapter5
#22 opened by GrannyProgramming - 0
Chapter4
#21 opened by GrannyProgramming - 0
Chapter3
#20 opened by GrannyProgramming - 0
Background section
#15 opened by GrannyProgramming - 0
Create Abstract
#11 opened by GrannyProgramming - 0
Explore Clustering
#7 opened by GrannyProgramming - 0
Chapter1
#12 opened by GrannyProgramming - 0
PCA alternatives
#9 opened by GrannyProgramming - 0
Learn Github
#2 opened by GrannyProgramming - 0
Preliminary Reasearch
#1 opened by GrannyProgramming