doneria-anjali / intrusion-detection-engine

Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Intrusion Detection in Cloud Systems Using Alternative Fuzzy C-Means Clustering and Artificial Neural Networks

This is the codebase for the project by Group#4 developed as a part of course CSC 724 (Advanced Distributed Systems) for credits. The dataset selected is KDD Cup '99 Dataset, which was developed by The Cyber Systems and Technology Group (formerly the DARPA Intrusion Detection Evaluation Group) of MIT Lincoln Laboratory.

We propose to use Alternative Fuzzy C-means Clustering (AFCM) and Artificial Neural Networks (ANN) for building a robust intrusion detection engine. As the part of the project, we modified the open-source implementation provided at https://github.com/HosseinAbedi/FCM/tree/master/fcm, which provides a C implementation for Fuzzy C-mean Clustering (FCM) to integrate the code for AFCM. 3-layer ANN models are developed using the Keras library which provides Sequential models for building these neural networks. We added a custom activation function for 'bipolar sigmoid activation function' by extending the open-source Keras code for our purpose.

The entire code is created, compiled and run on Ubuntu 16.04.4 LTS version.

STEPS to create and run Intrusion Detection Engine

Step 1:- ./generateTrainingData.sh (from dataPreparation folder)

Step 2:- make (from AFCM folder)

Step 3:- ./afcm train.data (from AFCM folder)

Step 4:- Install bro using following commands

    4.1:- sudo apt-get install cmake make gcc g++ flex bison libpcap-dev libssl-dev python-dev swig zlib1g-dev 
    (this is for debian based systems)
    
    4.2:- git clone --recursive git://git.bro.org/bro
    
    4.3:- cd bro
    
    4.4:- ./configure
    
    4.5:- make
    
    4.6:- sudo make install

Step 5:- Install python libraries

    5.1:- sudo pip install numpy
    
    5.2:- sudo pip install scipy
    
    5.3:- sudo pip install tensorflow
    
    5.4:- sudo pip install scikit-learn
    
    5.5:- sudo pip install h5py

    5.6:- sudo pip install keras

Step 6:- python engine.py

(from ANN folder) this would train and create the models for stage 2 and 3. (since there is no input file it would give an error that cap.txt doesn't exist. On first run the accuracies of each model is printed on screen).

Step 7:- create VM environment

Step 8:- sudo ./runIds.sh

(from ANN folder) The code will launch the engine every 1000 connections and display the percentage distribution of normal and attack packets. "cap.txt" (processed pcap file for input to python is created at this stage for every run). The backup of this cap for future reference is stored in the backup_test folder with a timestamp as the filename. The predictions for this cap_timestamp.txt file is in the log folder with the name cap_predictions_timestamp.txt.

Anjali Doneria (adoneri), Dipanjan Nag (dnag), Varun Garg (vsgarg)

Department of Computer Science, North Carolina State University, Raleigh, NC

About

Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network


Languages

Language:Python 97.2%Language:Bro 1.9%Language:C 0.7%Language:Shell 0.1%Language:Makefile 0.0%