Skip to content

Applying machine learning algorithms to classify military network connections as normal or anomalous.

Notifications You must be signed in to change notification settings

charafmrah/network-intrusion-detection

Repository files navigation


Network Intrusion Detection

Network Intrusion Detection using Machine Learning
Explore the docs »

Report Bug · Request Feature

About The Project

Product Name Screen Shot

Applying machine learning algorithms to a network dataset, which encompasses a broad range of intrusions that were simulated in a military network atmosphere. This created a way to acquire fresh TCP/IP dump information for a network by replicating a customary U.S. Air Force LAN. The LAN mirrored a realistic environment and was struck with multiple attacks. A connection is a sequence of TCP packets beginning and ending at a certain period, when data moves from a source IP address to a target IP address using a definite protocol. Each connection is identified as either ordinary or featuring a particular attack type. Each connection holds about 100 bytes. For each TCP/IP connection, 41 features are obtained from the normal and attack data (3 qualitative and 38 quantitative features). The class variable consists of two categories: Normal and Anomalous.

The dataset used is the KDD Cup 1999 dataset, which is available at the UCI Machine Learning Repository.

The dataset is also used by the NSL-KDD dataset, which is a more recent dataset that is based on the KDD Cup 1999 dataset.

The dataset is usually used by researchers to test their intrusion & anomoly detection systems. The dataset is also used by researchers to test their machine learning algorithms.

Dataset features descriptions

Basic features of individual TCP connections

  • duration: length (number of seconds) of the connection [continuous]
  • protocol_type: type of the protocol, e.g. tcp, udp, etc. [discrete]
  • service: network service on the destination, e.g., http, telnet, etc. [discrete]
  • src_bytes: number of data bytes from source to destination [continuous]
  • dst_bytes: number of data bytes from destination to source [continuous]
  • flag: normal or error status of the connection [discrete] 
  • land: 1 if connection is from/to the same host/port; 0 otherwise [discrete]
  • wrong_fragment: number of "wrong" fragments [continuous]
  • urgent: number of urgent packets [continuous]

Content features within a connection

  • hot: number of "hot" indicators [continuous]
  • num_failed_logins: number of failed login attempts [continuous]
  • logged_in: 1 if successfully logged in; 0 otherwise [discrete]
  • num_compromised: number of "compromised" conditions [continuous]
  • root_shell: 1 if root shell is obtained; 0 otherwise [discrete]
  • su_attempted: 1 if "su root" command attempted; 0 otherwise [discrete]
  • num_root: number of "root" accesses [continuous]
  • num_file_creations: number of file creation operations [continuous]
  • num_shells: number of shell prompts [continuous]
  • num_access_files: number of operations on access control files [continuous]
  • num_outbound_cmds: number of outbound commands in an ftp session [continuous]
  • is_host_login: 1 if the login belongs to the "hot" list; 0 otherwise [discrete]
  • is_guest_login: 1 if the login is a "guest login"; 0 otherwise [discrete]

Traffic features within a connection

  • count: number of connections to the same host as the current connection in the past two seconds [continuous]
  • srv_count: number of connections to the same service as the current connection in the past two seconds [continuous]
  • serror_rate: % of connections that have "SYN" errors [continuous]
  • srv_serror_rate: % of connections to the same service that have "SYN" errors [continuous]
  • rerror_rate: % of connections that have "REJ" errors [continuous]
  • srv_rerror_rate: % of connections to the same service that have "REJ" errors [continuous]
  • same_srv_rate: % of connections to the same service [continuous]
  • diff_srv_rate: % of connections to different services [continuous]
  • srv_diff_host_rate: % of connections to different hosts [continuous]

Time-based features

  • dst_host_count: number of connections to the same host as the current connection in the past two seconds [continuous]
  • dst_host_srv_count: number of connections to the same service as the current connection in the past two seconds [continuous]
  • dst_host_same_srv_rate: % of connections to the same service [continuous]
  • dst_host_diff_srv_rate: % of connections to different services [continuous]
  • dst_host_same_src_port_rate: % of connections to the same source port [continuous]
  • dst_host_srv_diff_host_rate: % of connections to different hosts [continuous]
  • dst_host_serror_rate: % of connections that have "SYN" errors [continuous]
  • dst_host_srv_serror_rate: % of connections that have "SYN" errors [continuous]
  • dst_host_rerror_rate: % of connections that have "REJ" errors [continuous]
  • dst_host_srv_rerror_rate: % of connections that have "REJ" errors [continuous]

The following feature is the target variable (included in the training set only):

  • class: normal or anomaly(attack) [discrete]

Used Technologies

  • Python

(back to top)

Contributing

Contributions are what make the open source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.

If you have a suggestion that would make this better, please fork the repo and create a pull request. You can also simply open an issue with the tag "enhancement". Don't forget to give the project a star! Thanks again!

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

(back to top)

Contact

Charaf Mrah - @charafmrah - [email protected]

(back to top)

Acknowledgments

(back to top)

About

Applying machine learning algorithms to classify military network connections as normal or anomalous.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published