<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mohammed Alaiady</title>
    <description>The latest articles on DEV Community by Mohammed Alaiady (@malaiady).</description>
    <link>https://dev.to/malaiady</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1277089%2F05999bed-28a6-477d-9d58-eb28c4f68299.jpeg</url>
      <title>DEV Community: Mohammed Alaiady</title>
      <link>https://dev.to/malaiady</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/malaiady"/>
    <language>en</language>
    <item>
      <title>Network Anomaly Detection Tool</title>
      <dc:creator>Mohammed Alaiady</dc:creator>
      <pubDate>Fri, 09 Feb 2024 18:31:19 +0000</pubDate>
      <link>https://dev.to/malaiady/network-anomaly-detection-tool-40o5</link>
      <guid>https://dev.to/malaiady/network-anomaly-detection-tool-40o5</guid>
      <description>&lt;h2&gt;
  
  
  Table of Contents
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;
&lt;li&gt;Features&lt;/li&gt;
&lt;li&gt;Installation&lt;/li&gt;
&lt;li&gt;Usage&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Overview
&lt;/h2&gt;

&lt;p&gt;This tool is designed for detecting abnormal behaviors in network traffic using the unsupervised Isolation Forest algorithm. It intercepts network packets in real-time, analyzes them, and identifies suspicious activities that deviate from normal patterns.&lt;/p&gt;

&lt;h3&gt;
  
  
  ScreenShot
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fm-alaiady%2FAbnormality-Detection-System-for-Network-Traffic%2Fmain%2Fimg%2Fimg-2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fm-alaiady%2FAbnormality-Detection-System-for-Network-Traffic%2Fmain%2Fimg%2Fimg-2.png" alt="Screenshot"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Features
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Real-time packet interception and analysis&lt;/li&gt;
&lt;li&gt;Detection of abnormal network behaviors&lt;/li&gt;
&lt;li&gt;User-friendly interface for visualization of intercepted packets&lt;/li&gt;
&lt;li&gt;Configurable parameters for fine-tuning the detection algorithm&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Installation
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Clone the repository:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/m-alaiady/Abnormality-Detection-System-for-Network-Traffic.git
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Navigate to the project directory
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cd &lt;/span&gt;Abnormality-Detection-System-for-Network-Traffic/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Install the required dependencies:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip3 &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Usage
&lt;/h2&gt;

&lt;p&gt;Run the following command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;sudo&lt;/span&gt; &lt;span class="n"&gt;python3&lt;/span&gt; &lt;span class="n"&gt;main&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;py&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Important: you need to modify the &lt;code&gt;interface&lt;/code&gt; variable which in located directly after the main function&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Adjust the &lt;code&gt;contamination&lt;/code&gt; parameter in the IsolationForest initialisation to control the sensitivity of the anomaly detection algorithm.
Monitor the console output for intercepted packets and their analysis results.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Visit &lt;a href="https://github.com/m-alaiady/Abnormality-Detection-System-for-Network-Traffic" rel="noopener noreferrer"&gt;GitHub Repository&lt;/a&gt; for more details.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
