dc.contributor.advisor | Hossain, Muhammad Iqbal | |
dc.contributor.author | Awon, Ahmed Musa | |
dc.contributor.author | Odree, Afid | |
dc.contributor.author | Islam, Samia | |
dc.contributor.author | Yeasmin, Afia | |
dc.contributor.author | Biva, Bivasha Bashir | |
dc.date.accessioned | 2024-11-21T06:07:22Z | |
dc.date.available | 2024-11-21T06:07:22Z | |
dc.date.copyright | ©2021 | |
dc.date.issued | 2021-01 | |
dc.identifier.other | ID 17101201 | |
dc.identifier.other | ID 17101183 | |
dc.identifier.other | ID 17101002 | |
dc.identifier.other | ID 17101182 | |
dc.identifier.other | ID 17101174 | |
dc.identifier.uri | http://hdl.handle.net/10361/24808 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2021. | en_US |
dc.description | Catalogued from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 22-23). | |
dc.description.abstract | Traditional IDS has been shielding against cyber threats for many years but it falls short on detecting
zero-day attacks. These are the attacks that are unique with unknown attack patterns and
mutating attack signatures making them difficult to detect. Machine learning approaches have
been extensively used in Intrusion Detection Systems (IDS) to detect both known and unknown
attacks. However, the widespread and rapid growth of zero-day attack forces researchers to
continuously seek to increase the performances of models to better detect these attacks. In this
paper, we used supervised machine learning approaches to detect zero-day attacks. The dataset
used for demonstration and evaluation was the latest CSE-CIC-IDS2018 dataset with 80 features
and 14 different types of attacks. All the attacks’ labels were represented as a single label
called ‘Attack’. The main aim behind this proposal was to compare between the performances of
the mainstream Machine Learning models in detecting Zero Day attacks. The proposed model
of Artificial Neural Network (ANN), Random Forest (RF) and K-Nearest Neighbor (KNN) all
achieved high accuracies with optimal parameter settings. With RF having an accuracy of 98.90
% , ANN with 98.3% and KNN with an accuracy of 98.53%.A better estimate of the performance
of the models can be seen by the false-negative rates of each model. | en_US |
dc.description.statementofresponsibility | Ahmed Musa Awon | |
dc.description.statementofresponsibility | Afid Odree | |
dc.description.statementofresponsibility | Samia Islam | |
dc.description.statementofresponsibility | Afia Yeasmin | |
dc.description.statementofresponsibility | Bivasha Bashir Biva | |
dc.format.extent | 32 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Artificial neural network | en_US |
dc.subject | ANN | en_US |
dc.subject | Random forest regressor | en_US |
dc.subject | K-nearest neighbors | en_US |
dc.subject | Supervised machine learning | en_US |
dc.subject | IDS | en_US |
dc.subject | Zero-day attacks | en_US |
dc.subject | Computer security | |
dc.subject.lcsh | Supervised learning (Machine learning). | |
dc.subject.lcsh | Data encryption (Computer science). | |
dc.subject.lcsh | Cyberterrorism--Prevention. | |
dc.subject.lcsh | Intrusion detection systems (Computer security). | |
dc.subject.lcsh | Computer networks--Security measures. | |
dc.title | A performance comparison between machine learning models on zero-day attack detection | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc. in Computer Science and Engineering | |