Skip to content

This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured datasets and explores the use of algorithms for detecting anomalies or malicious behavior in network traffic or system logs.

License

Notifications You must be signed in to change notification settings

karami-mehdi/CyberattackDetection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🌐 Cyberattack Detection and Anomalous Behavior Analysis Using Recurrent Neural Networks (RNN)

Cybersecurity is a critical domain as network attacks increasingly threaten systems worldwide. Detecting cyberattacks and analyzing anomalous behaviors in network traffic is essential for securing digital environments. This project leverages Recurrent Neural Network (RNN), technically Long Short-Term Memory (LSTM), to identify abnormal patterns in network traffic that signal potential cyberattacks, such as DDoS, port scanning, and brute-force attacks.

Dataset

The project utilizes the CIC-IDS2017 Dataset, developed by the Canadian Institute for Cybersecurity. It is widely used for intrusion detection system evaluation and contains real-world attack simulations, including:

  • DDoS attacks
  • Brute force attacks
  • SQL injection
  • Port scanning
  • Botnet activities

The dataset is suitable for RNN-based methods due to its sequential nature, allowing temporal dependencies in network traffic to be analyzed effectively.

For easier access, we used the Network Intrusion Dataset on Kaggle.

How to Run

  1. To run this project, clone the repository and navigate to the project directory:
git clone /~https://github.com/karami-mehdi/CyberattackDetection.git
cd CyberattackDetection
  1. Ensure you have Python 3.11.1+ and the required libraries installed. Use the command below to install dependencies:
pip install -r requirements.txt
  1. Open the Jupyter Notebook:
jupyter notebook cyberattack_detection.ipynb
  1. Execute the notebook cells sequentially to preprocess data, train the model, and evaluate results.

Results

The RNN model effectively detects cyberattacks with competitive accuracy, leveraging temporal patterns in the data. Detailed evaluation metrics and visualizations are included in the notebook.

License

This project is licensed under the MIT License.

About

This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured datasets and explores the use of algorithms for detecting anomalies or malicious behavior in network traffic or system logs.

Topics

Resources

License

Stars

Watchers

Forks