Skip to content

Developed a Machine Learning model to check the network is under attack or not and used five feature selection techniques in a sequence to find 11 best features from the dataset.

Notifications You must be signed in to change notification settings

hritik7080/Network-Intrusion-Detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Network-Intrusion-Detection

Created a Machine Learning model to check the network is under attack or not. I have used five feature selection techniques in a sequence to find the best features in the dataset.

  • Correlation based feature selection
  • Univariate Feature Selection
  • Recursive Feature Elimination (RFE)
  • Principle Component Analysis (PCA)
  • Linear Discriminant Analysis (LDA)

Please download the dataset from this link http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz and convert its extension to .csv Thank you!

About

Developed a Machine Learning model to check the network is under attack or not and used five feature selection techniques in a sequence to find 11 best features from the dataset.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages