Reference no: EM133520940
Case Study: For this question you need to implement three multi-classifiers to identify attack and normal behaviour from the UNSW-NB15 intrusion dataset. You are required to read the data from training set (175,341 records) and test set (82,332 records).
You are required to implement it by using the publicly available machine learning software WEKA.
For this task you will need two files available on below link:
• training.arff and test.arff.
You need to perform the following steps:
• Import training data.
• For each classifier:
- Select an appropriate classifier (do not choose any meta classifier)
- Specify test option
- Perform the training
- Supply test data set
- Evaluate the classifier.
Question: You need to repeat for at least 3 classifiers (Random Forest, Random Tree, J48, and eventually select the results from the best 2 classifiers.
You need to include in your report the following:
1. Screenshot of the performance details for 3 classifiers
2. Compare the results of the selected best 2 classifiers, evaluating with the metrics: Accuracy, precision, recall, F1-Score and false positive rate.
3. Which classifier gave the best performance overall? Justify your selection of the 'best' classifier and given reasons why you think it is the best. Is there any way to improve the performance further?
What things make up the internet anyway
: Who owns the Internet? What things make up the Internet anyway? Who manages the Internet? Who makes the Internet rules? Is this a good arrangement?
|
Create a mission and goals to outwardly express
: How can the organization create a mission and goals to outwardly express and reinforce its commitment to diversity and inclusion?
|
What is the overview of all social media used in markets
: What is the Overview of all Social Media (instagram , youtube and facebook) used in markets in the region for Motorrad, BMW , MINI and Rolls Royce?
|
Analyse security and management issues
: ICT373 Cloud Computing, Kings Own Institute - Identify and describe different enabling technologies for the Cloud and Design and apply a cloud strategy
|
Compare the results of the selected best 2 classifiers
: Compare the results of the selected best 2 classifiers, evaluating with the metrics: Accuracy, precision, recall, F1-Score and false positive rate.
|
What annual return does he need to earn
: If Mark wants to retire in 25 years with $1,011,000.00 and can save $9,680.00 annually for 25 years. What annual return does he need to earn?
|
Complete ife and calculate financial ratios for your company
: Complete an IFE and calculate financial ratios for your company. Financial ratio analysis with key conclusions and implications for strategic choice.
|
Identify and describe two models of communication
: Define communication and describe communication as a process. Identify and describe two models of communication.
|
Explore parallels and distinctions between security policies
: explore the parallels and distinctions between security policies applicable to a standard business and those relevant to an eCommerce enterprise.
|