Skip to content

The goal is to use machine learning algorithms to detect and classify network intrusions as either "bad connections" or "good connections" for the purpose of continuous monitoring and protecting against unauthorized access.

Notifications You must be signed in to change notification settings

kartikmehta8/Intrusion-Detection-System

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

BANNER

The objective is to detect network intrusions using a range of machine learning algorithms, which will allow for continuous monitoring of a network or system to identify malicious activity and protect it from unauthorized access by users, including potential insiders. The task of an intrusion detector is to develop a predictive model, specifically a classifier, capable of distinguishing between "bad connections" (i.e., attacks or intrusions) and "good connections" (i.e., normal activity).

Model Accuracies

Contributors

About

The goal is to use machine learning algorithms to detect and classify network intrusions as either "bad connections" or "good connections" for the purpose of continuous monitoring and protecting against unauthorized access.

Resources

Stars

Watchers

Forks