Professional Documents
Culture Documents
Intro 2
Intro 2
A PROJECT REPORT
Submitted by
PRANAV.S
SUNDARAM.S
VIGNESH.J
of
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
i
SRI VENKATESWARA COLLEGE OF ENGINEERING
(An Autonomous Institution; Affiliated to Anna University, Chennai -600 025)
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
Dr. V. Vidhya, M.E, Ph.D., Ms. R. Saktheeswari, M.E.,
HEAD OF THE DEPARTMENT SUPERVISOR
ASSISTANT PROFESSOR
(DDoS) attacks, serving as the foundation for training a robust classification model.
Feature extraction techniques are then applied to both network traffic data and
behavioral attributes to identify key features characterizing different attack types. The
system aims to accurately predict attack categories through the use of various supervised
learning algorithms, including decision trees, support vector machines (SVM), and
neural networks. By labeling historical attack instances, the model learns intricate
capabilities over time. Regular updates and retraining with new attack data ensure the
teams with enhanced predictive accuracy, the system enables swift identification and
iii
ACKNOWLEDGMENT
We express our sincere thanks to Dr. V. Vidhya, M.E., PhD., Head of the
Department, Information technology for her permission and encouragement accorded to
carry out this project.
With profound respect, we express our deep sense of gratitude and sincere thanks
to our guide Ms. R. Saktheeswari, M.E., for her valuable guidance andsuggestions
throughout this project.
PRANAV S
SUNDARAM S
VIGNESH J
iv
TABLE OF CONTENTS
2 LITERATURE REVIEW 7
2.1 INTRODUCTION 8
2.2 LITERATURE SURVEY 9
3 SYSTEM DESIGN 13
3.1 INTRODUCTION 13
3.2 DESIGN OF NETWORK TRAFFIC ATTACK 14
CLASSIFICATION SYSTEM
3.3 MODULE DESCRIPTION
3.3.1 Data Preprocessing
v
3.3.2 Feature Selection
3.3.3 Model Selection and Training
3.3.4 Model Evaluation
3.3.5 Deployment
3.4 GAUSSIAN NAIVES BAYES CLASSIFIER
3.5 ADABOOST
3.6 XGBOOST
3.7 RANDOM FOREST CLASSIFIER
4 SYSTEM REQUIREMENTS 21
4.1 HARDWARE REQUIREMENTS 21
4.2 SOFTWARE REQUIREMENTS 22
5 SYSTEM REQUIREMENTS 23
5.1 EXPERIMENTAL SETUP 23
5.2 COMPARISON BETWEEN MACHINE 24
LEARNING ALGORITHMS
5.3 RESULTS 26
5.4 PERFORMANCE EVALUATION
5.5 CLASSIFICATION AND MITIGATION OF
CYBER ATTACKS
REFERENCES 50
vi
LIST OF FIGURES
NO. NO.
4.1 21
5.2 24
5.5 29
7.1 39
7.2 39
7.3 40
7.4 40
7.5 41
7.6 41
7.7 42
7.8 42
7.9 43
vii
LIST OF TABLES
NO.
6.2 34
6.3 35
viii
LIST OF ABBREVATIONS
ABBREVATION EXPANSION
ix
10