Offered By: IBM
Network traffic anomaly detection (intrusion detection task)
Learn to build the model at the junction of NLP and Network Security areas with the help of Intrusion detection evaluation dataset (ISCXIDS2012) and the helping frameworks & libraries.
Continue readingGuided Project
970 Enrolled4.6
At a Glance
Learn to build the model at the junction of NLP and Network Security areas with the help of Intrusion detection evaluation dataset (ISCXIDS2012) and the helping frameworks & libraries.
The purpose of this lab is to build the model at the junction of NLP and Network Security areas with the help of Intrusion detection evaluation dataset (ISCXIDS2012) and the helping frameworks & libraries.
Learning Objectives
After completing this lab you will be able to:
- quickly explore the Intrusion detection evaluation dataset and build the best model with the help of functional programming and layer-by-layer model description to solve Network Traffic Anomaly Detection task.
- show different calculated metrics of the built model.
- change values of some hyperparameters for an improving of model training process to achieve better results.
- visualize the data analysis results with various plot types.