Skip to content

This project focuses on detecting cyber attacks using advanced analytical techniques and a deep learning model. It leverages structured datasets and explores the use of algorithms for detecting anomalies or malicious behavior in network traffic or system logs.

License

Notifications You must be signed in to change notification settings

nsswifter/CyberAttackDetection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🌐 Cyber Attack Detection and Anomalous Behavior Analysis Using Recurrent Neural Networks (RNN)

Cybersecurity is a critical domain as network attacks increasingly threaten systems worldwide. Detecting cyber attacks and analyzing anomalous behaviors in network traffic is essential for securing digital environments. This project leverages Recurrent Neural Networks (RNNs), technically Long Short-Term Memory (LSTM), to identify abnormal patterns in network traffic that signal potential cyberattacks, such as DDoS, port scanning, and brute-force attacks.

Dataset

The project utilizes the CIC-IDS2017 Dataset, developed by the Canadian Institute for Cybersecurity. It is widely used for intrusion detection system evaluation and contains real-world attack simulations, including:

  • DDoS attacks
  • Brute force attacks
  • SQL injection
  • Port scanning
  • Botnet activities

The dataset is suitable for RNN-based methods due to its sequential nature, allowing temporal dependencies in network traffic to be analyzed effectively.

For easier access, we used the Network Intrusion Dataset on Kaggle.

How to Run

  1. To run this project, clone the repository and navigate to the project directory:
git clone https://github.com/nsswifter/CyberAttackDetection.git
cd CyberAttackDetection
  1. Ensure you have Python 3.11.1+ and the required libraries installed. Use the command below to install dependencies:
pip install -r requirements.txt
  1. Open the Jupyter Notebook:
jupyter notebook cyber_attack_detection.ipynb
  1. Execute the notebook cells sequentially to preprocess data, train the model, and evaluate results.

Results

The RNN model effectively detects cyber attacks with competitive accuracy, leveraging temporal patterns in the data. Detailed evaluation metrics and visualizations are included in the notebook.

License

This project is licensed under the MIT License.

About

This project focuses on detecting cyber attacks using advanced analytical techniques and a deep learning model. It leverages structured datasets and explores the use of algorithms for detecting anomalies or malicious behavior in network traffic or system logs.

Topics

Resources

License

Stars

Watchers

Forks