The "Threat Detection in Cyber Security Using AI" project aims to develop a threat detection system using machine learning algorithms. The project consists of several steps, each of which contributes to the overall goal of enhancing cyber security. Here's an overview of each step:
- This step involves data preprocessing to prepare the dataset for machine learning.
- The dataset used is the CIC-IDS2017 dataset, which should be stored in the "CSVs" folder located in the same directory as the program.
- You can access the dataset files here.
- In this step, the program uses the "all_data.csv" file to create attack-specific files.
- These attack files are then saved in the "./attacks/" directory for further analysis.
- The dataset contains a total of 12 attack types, and this step separates them for individual examination.
- This step focuses on feature selection for the attack files created in Step 2.
- The program identifies the four features with the highest weight for each file.
- These selected features are used as input for machine learning algorithms.
- The final step applies seven machine learning algorithms to each attack file multiple times for robust evaluation.
- Results of these operations are displayed on the screen and saved in the file "./attacks/results_1.csv".
- Additionally, box and whisker graphics representing the results are generated.
- Both the graphics and results are saved in the "./attacks/result_graph_1/" folder.
You can access the CIC-IDS2017 dataset here.