Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Anomaly-Based Intrusion Detection System #684

Merged
merged 2 commits into from
Oct 21, 2024
Merged

Conversation

sharayuanuse
Copy link
Contributor

Pull Request for PyVerse 💡

Requesting to submit a pull request to the PyVerse repository.


Issue Title

Anomaly-Based Intrusion Detection System

  • I have provided the issue title.

Info about the Related Issue

The primary objective of this project is to develop an anomaly-based Intrusion Detection System (IDS) that identifies deviations from normal network behavior, potentially signaling an intrusion. This system uses machine learning techniques to classify network traffic as normal or anomalous, thus improving network security by detecting unusual or malicious activities.

  • I have described the aim of the project.

Name

Sharayu Anuse

  • I have provided my name.

GitHub ID

114616759

  • I have provided my GitHub ID.

Email ID

[email protected]

  • I have provided my email ID.

Identify Yourself

Mention in which program you are contributing (e.g., WoB, GSSOC, SSOC, SWOC).
GSSOC-Ext, Hacktoberfest

  • I have mentioned my participant role.

Closes

Enter the issue number that will be closed through this PR.
*Closes: #654 *

  • I have provided the issue number.

Describe the Add-ons or Changes You've Made

In this project, I have implemented an anomaly detection system for network intrusion detection. The system uses machine learning algorithms to classify network traffic and detect abnormal behavior indicative of a potential attack.

The project is divided into the following stages:

  • Data Preprocessing: Cleaning and preparing the dataset for training and testing.

  • Feature Engineering: Selecting and transforming relevant features for model training.

  • Model Training: Using classification algorithms such as Random Forest, Support Vector Machines (SVM), and others to train the IDS.

  • Evaluation: Evaluating the model's performance using metrics like accuracy, precision, recall, and F1-score.

  • Anomaly Detection: Detecting anomalies in the network traffic and classifying them as potential intrusions.

  • I have described my changes.


Type of Change

Select the type of change:

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Code style update (formatting, local variables)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • This change requires a documentation update

How Has This Been Tested?

  1. Data Preprocessing and Splitting:
  • The dataset was split into training and testing sets to evaluate the model's performance.
  • Various data preprocessing steps, such as handling missing values, scaling features, and encoding categorical data, were thoroughly tested to ensure compatibility with the machine learning models.
  1. Model Training and Cross-Validation:
  • Each machine learning model (Random Forest, SVM, etc.) was trained on the processed data, and k-fold cross-validation was used to assess the consistency and reliability of the models. This technique helped validate the models' performance across different subsets of the dataset, reducing the risk of overfitting.
  1. Performance Evaluation:
  • The models were evaluated using key metrics, such as accuracy, precision, recall, and F1-score, to ensure they could accurately classify network traffic and detect anomalies.

  • I have described my testing process.


Checklist

Please confirm the following:

  • My code follows the guidelines of this project.
  • I have performed a self-review of my own code.
  • I have commented my code, particularly wherever it was hard to understand.
  • I have made corresponding changes to the documentation.
  • My changes generate no new warnings.
  • I have added things that prove my fix is effective or that my feature works.
  • Any dependent changes have been merged and published in downstream modules.

Copy link

👋 Thank you for opening this pull request! We're excited to review your contribution. Please give us a moment, and we'll get back to you shortly!

Feel free to join our community on Discord to discuss more!

@UTSAVS26 UTSAVS26 added Contributor Denotes issues or PRs submitted by contributors to acknowledge their participation. Status: Review Ongoing PR is currently under review and awaiting feedback from reviewers. level1 gssoc-ext hacktoberfest labels Oct 18, 2024
@sharayuanuse
Copy link
Contributor Author

@shaansuraj @TheChaoticor

@UTSAVS26 UTSAVS26 merged commit 5d9a043 into UTSAVS26:main Oct 21, 2024
1 check passed
@UTSAVS26 UTSAVS26 added Status: Approved PRs that have passed review and are approved for merging. hacktoberfest-accepted and removed Status: Review Ongoing PR is currently under review and awaiting feedback from reviewers. labels Oct 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Contributor Denotes issues or PRs submitted by contributors to acknowledge their participation. gssoc-ext hacktoberfest hacktoberfest-accepted level1 Status: Approved PRs that have passed review and are approved for merging.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Anomaly-Based Intrusion Detection System
2 participants