Skip to content
/ ids-ac Public

Adaptive Cybersecurity Intrusion Detection System

Notifications You must be signed in to change notification settings

dzokha/ids-ac

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Abnormal packets detection

The Fourth Industrial Revolution is focusing on Artificial Intelligence technologies to explore and mine data. Most devices are now connected through the Internet, so cybersecurity issues have raised concerns. This work has built network services in a virtual environment to experiment network attacks with various techniques. In such an environment, we have implemented Honeynet architecture to collect attack data for further research. Our contributions include multi-folds. First, we deployed Honeynet architecture to collect data on actual cyber-attacks performed by real hackers and crackers. Also, we propose some techniques to normalize data and collect the HNET20 dataset with 29 extracted features including 200,000 samples experimented from 11 types of network attacks. Moreover, we design and propose the Adaptive Cybersecurity (AC) network system to detect attacks and provide warnings. The system reveals higher performance comparing to Snort method in detecting dangerous malicious attacks. Finally, we have experimented with different cyber-attacks to exploit the 10 Website security risks recommended by OWASP. From the research results, we can conclude that a typical cybercriminal attack cycle includes seven stages: reconnaissance, weapon making, distribution, exploitation, installation, control and control, and the goal. In this case, we proactively interrupt any action in the cybercriminal's attack cycle by early warnings using the Cyber Attack Warning and Detection System (AC) to prevent a potential cyber-attack.

Dataset HNET20

Normal Low Medium High
Sample 78,564 12,346 107,086 990
Percent 39,48% 6,20% 53,82% 0,50%

Dataset

Figure 1. Percentage Distribution of HNNET20

Data visualization with LDA

Dataset Figure 2. Represent the collected data on the 2D graph

Experimental Results

Dataset Figure 3. ACC and AUC results for the 2-class and 4-class classification problem

Installation

  • Create and use environment variable
  python3 -m venv venv
  source venv/bin/activate
  • Clone the repository and install the require packages
  git clone https://github.com/dzokha/ids-ac.git
  cd ids-ac
  • Install the packages
  pip3 install -r requirements.txt
  • Create table for Database
  flask db init
  flask db migrate
  flask db upgrade
  • Run IDS-AC
  ./start.sh

Visit Homepage

http://localhost:8181/

Homepage Figure 4. Online network monitoring interface with IDS-AC

About

Adaptive Cybersecurity Intrusion Detection System

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published