Unsupervised learning using ML for network intrusion












0












$begingroup$


I want to use unsupervised machine learning to classify network traffic as good and bad.



For that, I have an unlabeled attack dataset downloaded from here: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.



So far I have seen and read that ML allows you to create clusters of data which is similar.



So, my question is that how can I tell whether a certain cluster represents attack data points and another cluster represents normal traffic?



Is that something you need to figure out yourself or machine learning magically tells you that certain cluster represents attack traffic?










share|improve this question







New contributor




cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







$endgroup$

















    0












    $begingroup$


    I want to use unsupervised machine learning to classify network traffic as good and bad.



    For that, I have an unlabeled attack dataset downloaded from here: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.



    So far I have seen and read that ML allows you to create clusters of data which is similar.



    So, my question is that how can I tell whether a certain cluster represents attack data points and another cluster represents normal traffic?



    Is that something you need to figure out yourself or machine learning magically tells you that certain cluster represents attack traffic?










    share|improve this question







    New contributor




    cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.







    $endgroup$















      0












      0








      0





      $begingroup$


      I want to use unsupervised machine learning to classify network traffic as good and bad.



      For that, I have an unlabeled attack dataset downloaded from here: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.



      So far I have seen and read that ML allows you to create clusters of data which is similar.



      So, my question is that how can I tell whether a certain cluster represents attack data points and another cluster represents normal traffic?



      Is that something you need to figure out yourself or machine learning magically tells you that certain cluster represents attack traffic?










      share|improve this question







      New contributor




      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.







      $endgroup$




      I want to use unsupervised machine learning to classify network traffic as good and bad.



      For that, I have an unlabeled attack dataset downloaded from here: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.



      So far I have seen and read that ML allows you to create clusters of data which is similar.



      So, my question is that how can I tell whether a certain cluster represents attack data points and another cluster represents normal traffic?



      Is that something you need to figure out yourself or machine learning magically tells you that certain cluster represents attack traffic?







      machine-learning unsupervised-learning






      share|improve this question







      New contributor




      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 17 hours ago









      cpxcpx

      1011




      1011




      New contributor




      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      cpx is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          0






          active

          oldest

          votes











          Your Answer





          StackExchange.ifUsing("editor", function () {
          return StackExchange.using("mathjaxEditing", function () {
          StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix) {
          StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
          });
          });
          }, "mathjax-editing");

          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "557"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });






          cpx is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fdatascience.stackexchange.com%2fquestions%2f46517%2funsupervised-learning-using-ml-for-network-intrusion%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          cpx is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          cpx is a new contributor. Be nice, and check out our Code of Conduct.













          cpx is a new contributor. Be nice, and check out our Code of Conduct.












          cpx is a new contributor. Be nice, and check out our Code of Conduct.
















          Thanks for contributing an answer to Data Science Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          Use MathJax to format equations. MathJax reference.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fdatascience.stackexchange.com%2fquestions%2f46517%2funsupervised-learning-using-ml-for-network-intrusion%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          How to label and detect the document text images

          Vallis Paradisi

          Tabula Rosettana