SlideShare a Scribd company logo
2
Most read
6
Most read
16
Most read
DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY,
WOMEN UNIVERSITY OF AZAD JAMMU & KASHMIR, BAGH.
Anomaly Detection in Network Traffic using
Machine Learning
Presented By: Maria Khalil
Soomie Aftab
Supervised By: Dr. Jawad-ur-Rehman Chughtai
Introduction
1
Motivation &
Scope
2
Goals &
Objectives
4
Related work
3
Agenda
Tools &
Techniques
6
Gantt Chart
5
Introduction
4
• The ever-growing threat landscape and the increasing volume of network traffic make anomaly detection a crucial
aspect of cybersecurity.
• Machine learning (ML) offers powerful tools to identify unusual patterns that might indicate malicious activity.
• The focus of this project will be to develop a machine leanring-based solution for anomaly detection in network
traffic.
Introduction
Motivation & Scope
Motivation & Scope
• In recent years, cyber attacks have emerged as one of the most pervasive and damaging cybersecurity threats
facing organizations worldwide.
• These malicious attacks encrypt valuable data and demand hefty ransom payments in exchange for decryption
keys, causing significant financial losses, operational disruptions, and reputational damage to affected entities.
• Traditional security measures, such as firewalls and antivirus software, often struggle to detect and mitigate
cyber attacks effectively due to their rapidly evolving nature and sophisticated evasion techniques.
• There is a need to develop a machine leanring-based solution for anomaly detection in network traffic
6
Related Work
Related Work
• The authors in [1] proposed an ensemble model comprising Gradient Boosting and Random Forest as base
learners and Naive Bayes as a meta learner for detecting zero-day vulnerabilities in network traffic.
• Similarly, a deep stacked autoencoder followed by a Long-Short-Term Memory model is used in [2] to
significantly enhance ransomware stratification accuracy.
8
Goals & Objectives
10
Goals
• Develop a robust machine learning-based anomaly detection system capable of accurately identifying and
classifying cyber attacks within network traffic.
• Enhance the proactive defense capabilities of organizations against cyber attacks.
• Improve the accuracy and efficiency of anomaly detection by leveraging machine learning algorithms to analyze
network traffic patterns and identify anomalous behavior indicative of cyber activity.
• Collect and preprocess a comprehensive dataset of labeled network traffic samples.
• Transform categorical features using appropriate feature encoding technique and compute feature importance and
select the most important features using feature selection techniques.
• Normalize the final feature set using appropriate feature scaling technique and develop and train different
machine learning models using the final feature set.
• Optimize their performance metrics such as accuracy, precision, recall, and F1 score and select the best model
for final predictions.
Objectives
Gantt Chart
12
Gantt Chart
Tools & Technologies
14
Tools & Technologies
• For documentation, we will use Overleaf template.
• For coding, we will use python.
• For deployment/webpage, we will use Streamlit.
15
References
[1] Nkongolo, M. N. W. (2023). Zero-day vulnerability prevention with recursive feature elimination and
ensemble learning. Cryptology ePrint Archive.
[2] Nkongolo, M., & Tokmak, M. (2024). Ransomware detection using stacked autoencoder for feature
selection. arXiv preprint arXiv:2402.11342.
Thanks

More Related Content

PPTX
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
PPTX
Machine learning in Cyber Security
PPTX
NEUTRALIZATION OF BOTNET ACTIVITIES WITH MACHINE LEARNING AND AI APPROACH
PPTX
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
PDF
Patent. US11611582B2 [EN].pdf
PPTX
Managing security threats in today’s enterprise
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
CYBER THREAT DETECTION PLATFORM USING MACHINE LEARNING.pptx
Machine learning in Cyber Security
NEUTRALIZATION OF BOTNET ACTIVITIES WITH MACHINE LEARNING AND AI APPROACH
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
Patent. US11611582B2 [EN].pdf
Managing security threats in today’s enterprise
Cyber-Espionage: Understanding the Advanced Threat Landscape
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks

Similar to Anomaly Detection in Network Traffic using Machine Learning.pptx (20)

PDF
BEST CYBER SECURITY PRACTICES
PDF
Best Practices to Cybersecurity Vulnerability Management,.pdf
DOCX
Globally.docx
PPTX
Threat modelling(system + enterprise)
PPSX
Pharming attack
PDF
IRJET- Machine Learning based Network Security
PPTX
Economic impact of phishing detection systems.pptx
PPTX
Malware Classification and Analysis
PDF
Hyperparameters optimization XGBoost for network intrusion detection using CS...
PPTX
Machine Learning in Cyber Security
PPTX
TEAM.MAJOR[1] project based on the .pptx
PDF
DTS Solution - Building a SOC (Security Operations Center)
DOC
Updated Senior Cyber Intel security analyst
PDF
Info and telecom_network_security
PPTX
major_project.pptxvvvvvbbjjjjjjjjnjnnjjjjjj
PPTX
Vapt life cycle
PPTX
SAM05_Barber PW (7-9-15)
PDF
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
PPTX
First line of defense for cybersecurity : AI
PPTX
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
BEST CYBER SECURITY PRACTICES
Best Practices to Cybersecurity Vulnerability Management,.pdf
Globally.docx
Threat modelling(system + enterprise)
Pharming attack
IRJET- Machine Learning based Network Security
Economic impact of phishing detection systems.pptx
Malware Classification and Analysis
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Machine Learning in Cyber Security
TEAM.MAJOR[1] project based on the .pptx
DTS Solution - Building a SOC (Security Operations Center)
Updated Senior Cyber Intel security analyst
Info and telecom_network_security
major_project.pptxvvvvvbbjjjjjjjjnjnnjjjjjj
Vapt life cycle
SAM05_Barber PW (7-9-15)
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
First line of defense for cybersecurity : AI
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
RMMM.pdf make it easy to upload and study
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Cell Structure & Organelles in detailed.
O5-L3 Freight Transport Ops (International) V1.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Final Presentation General Medicine 03-08-2024.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
01-Introduction-to-Information-Management.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Computing-Curriculum for Schools in Ghana
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
Ad

Anomaly Detection in Network Traffic using Machine Learning.pptx

  • 1. DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, WOMEN UNIVERSITY OF AZAD JAMMU & KASHMIR, BAGH. Anomaly Detection in Network Traffic using Machine Learning Presented By: Maria Khalil Soomie Aftab Supervised By: Dr. Jawad-ur-Rehman Chughtai
  • 2. Introduction 1 Motivation & Scope 2 Goals & Objectives 4 Related work 3 Agenda Tools & Techniques 6 Gantt Chart 5
  • 4. 4 • The ever-growing threat landscape and the increasing volume of network traffic make anomaly detection a crucial aspect of cybersecurity. • Machine learning (ML) offers powerful tools to identify unusual patterns that might indicate malicious activity. • The focus of this project will be to develop a machine leanring-based solution for anomaly detection in network traffic. Introduction
  • 6. Motivation & Scope • In recent years, cyber attacks have emerged as one of the most pervasive and damaging cybersecurity threats facing organizations worldwide. • These malicious attacks encrypt valuable data and demand hefty ransom payments in exchange for decryption keys, causing significant financial losses, operational disruptions, and reputational damage to affected entities. • Traditional security measures, such as firewalls and antivirus software, often struggle to detect and mitigate cyber attacks effectively due to their rapidly evolving nature and sophisticated evasion techniques. • There is a need to develop a machine leanring-based solution for anomaly detection in network traffic 6
  • 8. Related Work • The authors in [1] proposed an ensemble model comprising Gradient Boosting and Random Forest as base learners and Naive Bayes as a meta learner for detecting zero-day vulnerabilities in network traffic. • Similarly, a deep stacked autoencoder followed by a Long-Short-Term Memory model is used in [2] to significantly enhance ransomware stratification accuracy. 8
  • 10. 10 Goals • Develop a robust machine learning-based anomaly detection system capable of accurately identifying and classifying cyber attacks within network traffic. • Enhance the proactive defense capabilities of organizations against cyber attacks. • Improve the accuracy and efficiency of anomaly detection by leveraging machine learning algorithms to analyze network traffic patterns and identify anomalous behavior indicative of cyber activity. • Collect and preprocess a comprehensive dataset of labeled network traffic samples. • Transform categorical features using appropriate feature encoding technique and compute feature importance and select the most important features using feature selection techniques. • Normalize the final feature set using appropriate feature scaling technique and develop and train different machine learning models using the final feature set. • Optimize their performance metrics such as accuracy, precision, recall, and F1 score and select the best model for final predictions. Objectives
  • 14. 14 Tools & Technologies • For documentation, we will use Overleaf template. • For coding, we will use python. • For deployment/webpage, we will use Streamlit.
  • 15. 15 References [1] Nkongolo, M. N. W. (2023). Zero-day vulnerability prevention with recursive feature elimination and ensemble learning. Cryptology ePrint Archive. [2] Nkongolo, M., & Tokmak, M. (2024). Ransomware detection using stacked autoencoder for feature selection. arXiv preprint arXiv:2402.11342.