Professional Documents
Culture Documents
CSC 407 REPORT
CSC 407 REPORT
A RESEARCH REPORT
ON
PRESENTED TO
BY
ii
CERTIFICATION
This is to certified that this research work was carried out by a group of
______________________ __________________
iii
DEDICATION
This research report is dedicated to God Almighty who has sustained and
kept us alive to this moment to research and document this report for
future use and also to our family members especially to our parents, who
ensure that we don’t lack anything at our stay in Futo and encouragement.
iv
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to all who have contributed
to the compilation of this report and making it a success (Cyber Security
Students, 400 Level).
Also, I will like to thank the school authorities for aligning course like IFT
405 for our, as this course gives a detailed guideline on how to write a
research work and get the best report you wanted.
v
ABSTRACT
A hybrid machine learning is a combination of multiple types of machine
learning algorithms for improving the performance of single classifiers.
Currently, cyber intrusion detection systems require high-performance
methods for classifications because attackers can develop invasive
methods and evade the detection tools. In this paper, the cyber intrusion
detection architecture based on new hybrid machine learning is proposed
for multiple cyber intrusion detection.
vi
emphasized using a combination of FAST (Features from Accelerated
Segment Test) and BRIEF (Binary Robust Independent Elementary
Features).
Finally, the ACGs, network traffic textual features, and texture features
are integrated using an ensemble model to effectively detect and classify
malware. This approach is tested on a customized dataset derived from
the CIC-InvesAndMal2019 dataset, achieving a remarkable accuracy of
99.27%, surpassing current state-of-the-art methods. Additionally, the
proposed method is tested using the CIC-AAGM2017 and CICMalDroid
2020 datasets, which include a total of 10.2K malware and 3.2K benign
samples. An explainable AI experiment is also performed to interpret the
proposed approach.
vii
TABLE OF CONTENT
COVER PAGE ……………………………………………………………………………….… I
CONTRIBUTORS …………………………………………………………………………… II
DEDICATION ……………………………………………………………………………… IV
ACKNOWLEDGEMENT ……………………………………………………………….... V
CHAPTER ONE
CHAPTER TWO
CHAPTER THREE
viii
3.1.1. Network Data Preprocessing ……………………………..……..
3.2. Deep Learning And Prominent Feature Selection Using CNN ….………
CHAPTER FOUR
CHAPTER FIVE
Appendix ………………………………………………………………………………..………
Reference ……………………………………………………………………………………….
ix