oliviagallucci / ids-aiml

🕵️ IDS with accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection

Home Page:https://oliviagallucci.com/ids-security-using-decision-trees-and-neural-networks/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ids-aiml 🕵️

Detective GIF

An IDS designed to detect network attacks using decision trees and neural networks.

GitHub MIT license Python Github-sponsors

Project Overview

This GitHub repository contains the code and documentation for an Intrusion Detection System (IDS) developed by Derek Chan and Olivia Gallucci under the supervision of Dr. Leon Reznik. The IDS is designed to detect network attacks using decision trees and neural networks.

Usage Steps

Step 1: Clone the Repository

Clone this GitHub repository to your local machine:

git clone https://github.com/your-username/ids-aiml

Step 2: Navigate to the Project Directory

cd ids-aiml

Step 3: Explore the Project Structure

Take a moment to explore the project structure as well as the Weka user guide. Read the steps in the "Data preparation" and "Operation" sections to know how we preprocessed the data using the provided Python script (preprocessing.py).

Step 4: Set Up Environment

Ensure you have Python installed along with the required libraries (pandas, numpy, sklearn, concurrent.futures). Weka is also required for the neural network module.

Step 5: Misuse IDS

Design

  • Use the provided Python script for misuse IDS (misuse_ids.py).
  • Adjust parameters based on your requirements.

Operation

  • Run the script to train and test the misuse IDS.
  • Review the generated results and metrics.

Step 6: Anomaly IDS

Design

  • Utilize the provided Python script for anomaly IDS (anomaly_ids.py).
  • Adjust parameters as needed.

Operation

  • Execute the script to train and test the anomaly IDS.
  • Examine the results and metrics.

Step 7: Neural Network

Design

  • Refer to the Weka user guide for loading and preprocessing data for neural network training.
  • Set hyperparameters for the Multilayer Perceptron (MLP) as described in the README.

Operation

  • Use Weka Explorer to train and test the MLP neural network.
  • Evaluate the model's performance based on accuracy and other metrics.

Step 8: Data Analysis with Weka

Step 9: Tests and Results

  • Explore the provided test results for the IDS systems, including accuracy, training time, and memory footprint.

Additional Information

For any questions or issues, please feel free to reach out to the project contributors listed in the README. Thank you for your interest in our intrusion detection system project!

Releases

  • 1.0.0-alpha - testing is done by developers only

Acknowledgements

Warranty

MIT

The creator(s) of this tool provides no warranty or assurance regarding its performance, dependability, or suitability for any specific purpose.

The tool is furnished on an "as is" basis without any form of warranty, whether express or implied, encompassing, but not limited to, implied warranties of merchantability, fitness for a particular purpose, or non-infringement.

The user assumes full responsibility for employing this tool and does so at their own peril. The creator(s) holds no accountability for any loss, damage, or expenses sustained by the user or any third party due to the utilization of this tool, whether in a direct or indirect manner.

Moreover, the creator(s) explicitly renounces any liability or responsibility for the accuracy, substance, or availability of information acquired through the use of this tool, as well as for any harm inflicted by viruses, malware, or other malicious components that may infiltrate the user's system as a result of employing this tool.

By utilizing this tool, the user acknowledges that they have perused and understood this warranty declaration and agree to undertake all risks linked to its utilization.

License

This project is licensed under the MIT License - see the LICENSE.md file for details

About

🕵️ IDS with accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection

https://oliviagallucci.com/ids-security-using-decision-trees-and-neural-networks/

License:MIT License


Languages

Language:Python 91.0%Language:Makefile 9.0%