際際滷

際際滷Share a Scribd company logo
IDS.pptx
 What is Intrusion Detection System
 Attack Types
 Problem Definition
 KDDcup99
 Reference Paper
IDS.pptx
IDS.pptx
 Objective
 Build a machine learning model/Deep learning model (classifiers) to detect the potential
attack type based on features in connections provided in the datasets.
 Datasets: KDD cup 1999
https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Data
Duration Protocol_type
Service Flag Src_bytes Dst_bytes attack_type difficulty_level Is_guest_login Land Wrong_fragment
Urgent Hot
13 tcp telnet SF 118 2425 guess_passwd 2 0 0 0 0 0
0 udp private SF 44 0 snmpguess 12 0 0 0 0 0
0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0
0 udp private SF 53 55 normal 17 0 0 0 0 0
0 tcp private SH 0 0 nmap 17 0 0 0 0 0
0 tcp http SF 54540 8314 back 10 0 0 0 0 2
0 tcp imap4 REJ 0 0 neptune 19 0 0 0 0 0
7570 tcp telnet SF 0 44 processtable 18 0 0 0 0 0
0 udp private SF 56 52 normal 17 0 0 0 0 0
0 tcp ftp_data SF 192 0 normal 20 0 0 0 0 0
0 tcp other REJ 0 0 satan 20 0 0 0 0 0
0 tcp other REJ 0 0 saint 19 0 0 0 0 0
0 tcp telnet SF 21 97 mscan 11 0 0 0 0 0
0 udp private SF 45 0 snmpguess 16 0 0 0 0 0
0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0
0 tcp imap4 REJ 0 0 mscan 14 0 0 0 0 0
0 tcp http S0 0 0 apache2 18 0 0 0 0 0
0 tcp ctf S0 0 0 neptune 18 0 0 0 0 0
0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0
0 udp private SF 1 1 satan 15 0 0 0 0 0
0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0
0 udp other SF 1 1 satan 17 0 0 0 0 0
0 tcp other SF 240 619 httptunnel 6 0 0 0 0 0
10 tcp pop_3 SF 27 93 guess_passwd 16 0 0 0 0 0
0 tcp http S0 0 0 apache2 18 0 0 0 0 0
0 udp private SF 42 0 snmpguess 9 0 0 0 0 0
0 tcp http SF 54540 8314 back 11 0 0 0 0 2
282 tcp ftp SF 156 593 warezmaster 11 1 0 0 0 2
Add some notes
here!
11,851
 Normal and Attack diagram
 see kdd video
Through this paper, the author compares various data pre-
processing methods categorized as:
1- Feature selection,
 Chi-Squared Test (CST)
 Random forest classifier (RFC)
 Extra tree classifier (ETC)
2- Feature encoding,
 One hot encoder (OHT)
 Binary encoder (BE)
 Frequency encoder (FE)
 Label encoder (LE)
3- and Feature scaling.
 Min-Max (MM)
 Standardization (Std)
 Binarizing(Bin)
 Normalizing(Norm)
The pre-processed data and an Autoencoder are used for
further processing to get the best features and use them with a
deep neural network for classification.

More Related Content

Similar to IDS.pptx (20)

PDF
PERFORMANCE EVALUATION OF DIFFERENT KERNELS FOR SUPPORT VECTOR MACHINE USED I...
IJCNCJournal
PDF
Data mining final report
Kedar Kumar
PDF
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
IJNSA Journal
PDF
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
IJNSA Journal
PDF
DDoS Attack Detection and Botnet Prevention using Machine Learning
IRJET Journal
PDF
Detection of malicious attacks by Meta classification algorithms
Eswar Publications
PDF
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
PPTX
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
PDF
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
PDF
Survey of network anomaly detection using markov chain
ijcseit
PDF
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
PDF
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
ijcseit
PDF
Intrusion Detection System Classification Using Different Machine Learning Al...
AIRCC Publishing Corporation
PDF
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
PPTX
A survey of random forest based methods for
Nikhil Sharma
PDF
Hybrid Approach for Intrusion Detection Model Using Combination of K-Means Cl...
theijes
PDF
Intrusion Detection System for Classification of Attacks with Cross Validation
inventionjournals
PPTX
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
PDF
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
IJMER
PDF
International Journal of Network Security & Its Applications (IJNSA) - Curren...
IJNSA Journal
PERFORMANCE EVALUATION OF DIFFERENT KERNELS FOR SUPPORT VECTOR MACHINE USED I...
IJCNCJournal
Data mining final report
Kedar Kumar
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
IJNSA Journal
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
IJNSA Journal
DDoS Attack Detection and Botnet Prevention using Machine Learning
IRJET Journal
Detection of malicious attacks by Meta classification algorithms
Eswar Publications
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
Application of machine learning and cognitive computing in intrusion detectio...
Mahdi Hosseini Moghaddam
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
Survey of network anomaly detection using markov chain
ijcseit
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
ijcseit
Intrusion Detection System Classification Using Different Machine Learning Al...
AIRCC Publishing Corporation
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
A survey of random forest based methods for
Nikhil Sharma
Hybrid Approach for Intrusion Detection Model Using Combination of K-Means Cl...
theijes
Intrusion Detection System for Classification of Attacks with Cross Validation
inventionjournals
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
IJMER
International Journal of Network Security & Its Applications (IJNSA) - Curren...
IJNSA Journal

Recently uploaded (20)

PDF
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
PPTX
Wondershare Filmora Crack Free Download 2025
josanj305
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
PDF
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
PPTX
CapCut Pro PC Crack Latest Version Free Free
josanj305
PPTX
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
PDF
How to Visualize the Spatio-Temporal Data Using CesiumJS
SANGHEE SHIN
PDF
How to Comply With Saudi Arabias National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
PPTX
Practical Applications of AI in Local Government
OnBoard
PDF
A Re-imagination of Embedded Vision System Design, a Presentation from Imag...
Edge AI and Vision Alliance
PDF
Quantum Threats Are Closer Than You Think Act Now to Stay Secure
WSO2
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
PDF
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
Wondershare Filmora Crack Free Download 2025
josanj305
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
CapCut Pro PC Crack Latest Version Free Free
josanj305
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
How to Visualize the Spatio-Temporal Data Using CesiumJS
SANGHEE SHIN
How to Comply With Saudi Arabias National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
Practical Applications of AI in Local Government
OnBoard
A Re-imagination of Embedded Vision System Design, a Presentation from Imag...
Edge AI and Vision Alliance
Quantum Threats Are Closer Than You Think Act Now to Stay Secure
WSO2
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
Ad

IDS.pptx

  • 2. What is Intrusion Detection System Attack Types Problem Definition KDDcup99 Reference Paper
  • 5. Objective Build a machine learning model/Deep learning model (classifiers) to detect the potential attack type based on features in connections provided in the datasets. Datasets: KDD cup 1999 https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Data
  • 6. Duration Protocol_type Service Flag Src_bytes Dst_bytes attack_type difficulty_level Is_guest_login Land Wrong_fragment Urgent Hot 13 tcp telnet SF 118 2425 guess_passwd 2 0 0 0 0 0 0 udp private SF 44 0 snmpguess 12 0 0 0 0 0 0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0 0 udp private SF 53 55 normal 17 0 0 0 0 0 0 tcp private SH 0 0 nmap 17 0 0 0 0 0 0 tcp http SF 54540 8314 back 10 0 0 0 0 2 0 tcp imap4 REJ 0 0 neptune 19 0 0 0 0 0 7570 tcp telnet SF 0 44 processtable 18 0 0 0 0 0 0 udp private SF 56 52 normal 17 0 0 0 0 0 0 tcp ftp_data SF 192 0 normal 20 0 0 0 0 0 0 tcp other REJ 0 0 satan 20 0 0 0 0 0 0 tcp other REJ 0 0 saint 19 0 0 0 0 0 0 tcp telnet SF 21 97 mscan 11 0 0 0 0 0 0 udp private SF 45 0 snmpguess 16 0 0 0 0 0 0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0 0 tcp imap4 REJ 0 0 mscan 14 0 0 0 0 0 0 tcp http S0 0 0 apache2 18 0 0 0 0 0 0 tcp ctf S0 0 0 neptune 18 0 0 0 0 0 0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0 0 udp private SF 1 1 satan 15 0 0 0 0 0 0 tcp telnet S3 0 44 processtable 18 0 0 0 0 0 0 udp other SF 1 1 satan 17 0 0 0 0 0 0 tcp other SF 240 619 httptunnel 6 0 0 0 0 0 10 tcp pop_3 SF 27 93 guess_passwd 16 0 0 0 0 0 0 tcp http S0 0 0 apache2 18 0 0 0 0 0 0 udp private SF 42 0 snmpguess 9 0 0 0 0 0 0 tcp http SF 54540 8314 back 11 0 0 0 0 2 282 tcp ftp SF 156 593 warezmaster 11 1 0 0 0 2 Add some notes here! 11,851
  • 7. Normal and Attack diagram see kdd video
  • 8. Through this paper, the author compares various data pre- processing methods categorized as: 1- Feature selection, Chi-Squared Test (CST) Random forest classifier (RFC) Extra tree classifier (ETC) 2- Feature encoding, One hot encoder (OHT) Binary encoder (BE) Frequency encoder (FE) Label encoder (LE) 3- and Feature scaling. Min-Max (MM) Standardization (Std) Binarizing(Bin) Normalizing(Norm) The pre-processed data and an Autoencoder are used for further processing to get the best features and use them with a deep neural network for classification.