Closed

Network Intrusion Detection and Prevention using Reinforcement Learning algorithm

Network Intrusion Detection System using Machine Learning (Reinforcement algorithm)

To detect these intrusions our proposed approach would be using Deep Reinforcement Learning and Q Learning which improves the stability and performance of the system.

We want to detect DDoS attack:

DDoS: Distributed Denial of Service attack is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. These attacks are one of the most dangerous security threats, in which attackers aim to break down the victim’s computer network or cyber system and interrupt their services. MEC systems are especially vulnerable to distributed DoS attacks, in which some distributed edge devices that are not well protected by security protocols can be easily compromised and then used to attack other edge nodes. Some attackers also aim to prevent the collaborative caching users from accessing the caching data. Jamming can be viewed as a special type of DoS attack.

The simplest approach could be to examine the logs of the web server and to identify whether the query relates to the DoS/DDoS attack or not. Collect the good and bad queries, label them (either bot or not). The tricky part will be to extract features. As features you can use: HTTP request method HTTP status code URL File name ([login to view URL]) Useragent IP address Geolocation of the IP address Train and test machine learning model. The drawback of the proposed approach is that the requests are treated as single objects and not as a part of the attack.

Our proposed method consists of first by using a supervised learning model the Support Vector Machines (SVM), which captures network traffic, filters HTTP headers, normalizes the data on the basis of the operational variables: rate of false positives, rate of false negatives, rate of classification and then sends the information to corresponding SVM’s training and testing sets.

then, we use Deep Q learning to attain the best possible reward.

We are using CICIDS 2017 dataset for intrusion detection which has the latest attributes with new types of attacks. In this section we have analyzed various types of publicly available dataset which we have used for training our neural network.

CICIDS2017: Generating the realistic background traffic is one of the highest priorities of this work. For this dataset, we used our proposed B-Profile system (Sharafaldin et al., 2017), which is responsible for profiling the abstract behavior of human interactions and generate a naturalistic benign background traffic. Our B-Profile for this dataset extracts the abstract behavior of 25 users based on the HTTP, HTTPS, FTP, SSH, and email protocols.

It also includes the results of the network traffic analysis using CICFlowMeter with labeled flows based on the time stamp, source and destination IPs, source and destination ports, protocols and attack (CSV files).

Evner: Computer Sikkerhed, Maskinoplæring, Matlab and Mathematica, Python, Web Sikkerhed

Se mere: machine learning network anomaly detection, an application of machine learning to network intrusion detection, machine learning techniques for intrusion detection system, intrusion detection system using machine learning algorithms, network intrusion detection using machine learning anomaly detection algorithms, machine learning based ids, how does intrusion detection systems utilize machine learning, ids using machine learning, Stock Market Prediction using Machine Learning Algorithm, reinforcement learning algorithm java, network intrusion detection system using data mining project, network intrusion detection system source code java, network intrusion detection source code java, java intrusion detection system using java, design network intrusion detection system java, network intrusion detection system java source code, network intrusion detection system, network intrusion detection system using java, network intrusion detection java, intrusion detection system using java

Om arbejdsgiveren:
( 2 bedømmelser ) Karlskrona, Sweden

Projekt ID: #17158380

17 freelancere byder i gennemsnit kr4485 på dette job

kr4722 SEK in 10 dage
(9 bedømmelser)
6.4
leon0209

Dear Client, I did same projects with different dataset around 2 years ago. I can show you the demo of the program. The data was huge, it took 3 hours for my laptop to process them. I also know how to use data for t Flere

kr5000 SEK in 7 dage
(33 bedømmelser)
6.0
schoudhary1553

Hello, I can help with you in your project Network Intrusion Detection and Prevention using Reinforcement Learning algorithm. I have more than 5 years of experience in Computer Security, Machine Learning, Matlab and Flere

kr4800 SEK in 10 dage
(30 bedømmelser)
5.5
kr3555 SEK in 10 dage
(4 bedømmelser)
5.2
williams115

Hi, there - My name is Phong. I have read your job description and I am very interested in this project. I have 7+ years experience in machine learning classification on the intrusion detection data. I am highly qua Flere

kr2500 SEK in 10 dage
(8 bedømmelser)
4.8
vaibhav290797

I have 2.5+ years of experience in machine learning, computer vision, and deep learning. I have worked on Image processing and computer vision (Image classification, segmentation, description, compression, super-resolu Flere

kr14444 SEK in 25 dage
(7 bedømmelser)
4.0
vorasiddh4it

We have 10+ years experience in software development. We have developed 400+ projects and the research paper in the field of Machine Learning, Artificial Intelligence and Image processing (GIS), Network, SEO based Web Flere

kr5000 SEK in 10 dage
(7 bedømmelser)
4.2
kr3555 SEK in 10 dage
(3 bedømmelser)
3.3
webplus0404

Hi, I am an expert in WSN and Machine learning. I simulated detect DDoS attack using machine learning previously. I can help you with high quality. Thanks.

kr2000 SEK in 5 dage
(3 bedømmelser)
3.2
kr3555 SEK in 10 dage
(3 bedømmelser)
3.0
kr3555 SEK in 10 dage
(1 bedømmelse)
3.0
kr3555 SEK in 10 dage
(1 bedømmelse)
2.6
kr2222 SEK in 7 dage
(1 bedømmelse)
1.2
seelamkomalkumar

I am data science security professional. I am sure i can help u here. Ping me when u r available, we can discuss further.

kr3555 SEK in 10 dage
(1 bedømmelse)
0.5
kr5555 SEK in 6 dage
(0 bedømmelser)
0.0
kr4444 SEK in 10 dage
(0 bedømmelser)
0.0
techbla

We will use open AI, gym and deep q learning to develop the project. the entire project will have a training data set and a deep learning set to give accurate results. We will also use two different approaches to dat Flere

kr4222 SEK in 10 dage
(0 bedømmelser)
0.0