Git Product home page Git Product logo

intrusion-detection-systems's Introduction

Intrusion Detection Systems forthebadge made-with-python 2 Maintenance Open Source Love svg1

This repo consists of all the codes and datasets of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security".

Abstract :

Intrusion detection system (IDS) has become an essential layer in all the latest ICT system due to an urge towards cyber safety in the day-to-day world. Reasons including uncertainty in finding the types of attacks and increased the complexity of advanced cyber attacks, IDS calls for the need of integration of Deep Neural Networks (DNNs). In this paper, DNNs have been utilized to predict the attacks on Network Intrusion Detection System (N-IDS). A DNN with 0.1 rate of learning is applied and is run for 1000 number of epochs and KDDCup-’99’ dataset has been used for training and benchmarking the network. For comparison purposes, the training is done on the same dataset with several other classical machine learning algorithms and DNN of layers ranging from 1 to 5. The results were compared and concluded that a DNN of 3 layers has superior performance over all the other classical machine learning algorithms.

Keywords :

Intrusion detection, deep neural networks, machine learning, deep learning

Authors :

Rahul-Vigneswaran K, Vinayakumar R, Soman KP and Prabaharan Poornachandran

Department of Mechanical Engineering, Amrita Vishwa Vidyapeetham, India.
Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore.
Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri Amrita Vishwa Vidyapeetham, India.

How to run the code?

For Classical Machine Learning

For Deep Neural Network (100 iterations)

  • Run dnn1.py for 1-hidden layer network and run dnn1acc.py for finding it's accuracy. [Link]
  • Run dnn2.py for 2-hidden layer network and run dnn2acc.py for finding it's accuracy. [Link]
  • Run dnn3.py for 3-hidden layer network and run dnn3acc.py for finding it's accuracy. [Link]
  • Run dnn4.py for 4-hidden layer network and run dnn4acc.py for finding it's accuracy. [Link]
  • Run dnn5.py for 5-hidden layer network and run dnn5acc.py for finding it's accuracy. [Link]

For Deep Neural Network (1000 iterations)

  • Run dnn1.py for 1-hidden layer network and run dnn1acc.py for finding it's accuracy. [Link]
  • Run dnn2.py for 2-hidden layer network and run dnn2acc.py for finding it's accuracy. [Link]
  • Run dnn3.py for 3-hidden layer network and run dnn3acc.py for finding it's accuracy. [Link]
  • Run dnn4.py for 4-hidden layer network and run dnn4acc.py for finding it's accuracy. [Link]
  • Run dnn5.py for 5-hidden layer network and run dnn5acc.py for finding it's accuracy. [Link]

Recommended Citation :

If you use this repository in your research, cite the the following papers :

  1. Rahul, V.K., Vinayakumar, R., Soman, K.P., & Poornachandran, P. (2018). Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security. 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 1-6.
  2. Rahul-Vigneswaran, K., Poornachandran, P., & Soman, K.P. (2019). A Compendium on Network and Host based Intrusion Detection Systems. CoRR, abs/1904.03491.

Bibtex Format :

@article{Rahul2018EvaluatingSA,
  title={Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security},
  author={Vigneswaran K Rahul and R. Vinayakumar and K. P. Soman and Prabaharan Poornachandran},
  journal={2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)},
  year={2018},
  pages={1-6}
  }

@article{RahulVigneswaran2019ACO,
  title={A Compendium on Network and Host based Intrusion Detection Systems},
  author={K Rahul-Vigneswaran and Prabaharan Poornachandran and K. P. Soman},
  journal={CoRR},
  year={2019},
  volume={abs/1904.03491}
  }

Issue / Want to Contribute ? :

Open a new issue or do a pull request incase your are facing any difficulty with the code base or you want to contribute to it.

forthebadge

intrusion-detection-systems's People

Contributors

rahulvigneswaran avatar smartmanoj avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.