Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

DMA COURSE PROJECT

Cyber Security and Data Mining Competition


Phase-04
Team No:15 Division:B
SL NO NAME USN
1 Annapurna.Banakar 01fe20bcs408
Team Members: 2 Rohini.Mutalikdesai 01fe20bcs415

3 Roopa.Vastrad 01fe20bcs417

4 Nivedita.Dambaralli 01fe20bcs413

5 Soubhagyavati.K 01fe18bcs216
Team Members Contribution:
Task 1:
●Data pre-processing:
●Learning model building:
●Presentation:
Task 3:
●Data pre-processing:
●Learning model building:
●Presentation:
Problem Statement:
Task 1: KISTI+IDS2021-CDMC: Network Intrusion Detection
● Over the last decade, various research studies had been carried to construct a
robust Intrusion Detection System (IDS). Even though, advanced network
attacks were raised with developing communication technologies.
● An IDS should be able to identify all abnormal patterns, and responding to
unauthorized activities in the system.

Task 3: CDMC2021 IoT Malware Detection


● Based on the control flow graphs (CFGs) generated by a static-analysis tool,
Radare2, and labels that indicating whether the samples are malware
programs, the participants are required to perform an IoT malware detection
task to predict whether the samples in the test set are malware or not.
Task 1: Intrusion Detection System
Data Pre-Processing:

● Checking for null values.


● Assigning the dataset for dataframe and dropping null
values.
● Making sure null values are dropped.
● Computing average and replacing the columns of
'word_vector'.
Task 1: Intrusion Detection System
Learning Model:

1) Naive bayes classifier


2) Support Vector Machine classifier
3) Decision Tree Classifier
4) Logistic Regression
5) KNN Classifier
6) Bagging Classifier
7) Random Forest
8) AdaBoost Classifier
Task1: Results:
Algorithm Accuaracy(%)

Naive bayes classifier 56.22

Support Vector Machine classifier 56.22

Decision Tree Classifier 78.51

Logistic Regression 56.53

KNN Classifier 77.27

Bagging Classifier 77.46

Random Forest 78.50

AdaBoost Classifier 73.75


Task 3: IoT Malware Detection
Data Pre-Processing:

● Dropping the unnecessary columns.


● Checking for missing values.
● Removing outliers in the label attribute.
● Fixing the label attribute.
Task 3: IoT Malware Detection
Learning Model:
1) Logistic Regression
2) Linear Discriminant Analysis
3) KNeighbors Classifier
4) Decision Tree Classifier
5) Gaussian Naive bayes classifier
6) Support Vector Machine classifier
Task 3: Results:
Algorithm Accuaracy(%)

0.941818
Gaussian Naive bayes classifier

Support Vector Machine classifier 0.971818

Decision Tree Classifier 0.960909

Logistic Regression 0.941818

KNeighbors Classifier 0.950909

Linear Discriminant Analysis 0.980909


Task 3: Comparison of Algorithms:
Summary:Task 3
● Among the all algorithms SVM is giving high accuracy and decision
tree classifier is giving lowest accuracy.
Conclusion:
❖ IDS can be devided into two types: Malicious and benign. We compared and
analysed 8 different learning model algorithms to finding out the solution.
❖ After the comparison of these algorithms, Decision tree classifier and random
forest are giving highest accuracy(78%).
❖ Based on the control flow graphs (CFGs) generated by a static-analysis tool,
Radare2, and labels that indicating whether the samples are malware
programs. We compared and analysed 6 different learning model algorithms to
finding out the solution.
❖ After the comparison of these algorithms, SVM is giving high accuracy and
decision tree classifier is giving lowest accuracy.
THANK YOU

You might also like