{"id":10,"date":"2025-02-22T00:13:41","date_gmt":"2025-02-22T00:13:41","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/?p=10"},"modified":"2025-02-22T00:13:41","modified_gmt":"2025-02-22T00:13:41","slug":"bi-weekly-update-1","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/2025\/02\/22\/bi-weekly-update-1\/","title":{"rendered":"Bi-Weekly Update #1"},"content":{"rendered":"\n<p>During the last couple weeks I did some more research on my project. First I evaluated the machine learning algorithms I\u2019d be using. I had intended to use a neural network to classify the network intrusion packets because of its current popularity and strong performance, though I have now decided to use a linear support vector machine instead, because neural networks are very difficult to interpret, and I would like to be able to investigate what features the learning methods deem most indicative of a network intrusion. Thus I will use a random forest learning algorithm, and a support vector machine algorithm in my analysis.&nbsp;<\/p>\n\n\n\n<p>I have also decided that instead of building a packet reading script to build a csv, I will use the pre-existing csv\u2019s for my analysis. I have two reasons for this change: first, because the packet reading script would be time consuming to create and I believe that the implementation of the algorithms will be very time consuming by themselves, and secondly, because the CSVs from the dataset I\u2019ll be using contain information in the features section that cannot be found through analysis of the packets alone, and I more information will surely lead to better learning algorithms.<\/p>\n\n\n\n<p>During these last two weeks I have researched the algorithms I\u2019d be using, and written and implemented the code to read the csv files, as well as the code for using k-fold cross validation for my analysis.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Project Logbook &#8211; Feb 21<\/h1>\n\n\n\n<p>Feb 5 &#8211; Researched project Ideas &#8211; 2 hours<\/p>\n\n\n\n<p>Feb 7 &#8211; Wrote Project proposal &#8211; 3 hours<\/p>\n\n\n\n<p>Feb 17 &#8211; Further research of learning algorithms &#8211; 1 hour<\/p>\n\n\n\n<p>Feb 19 &#8211; Wrote code for: &nbsp; &#8211; 3 hours<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reading the dataset<\/li>\n\n\n\n<li>Partitioning the data into training and testing sets<\/li>\n\n\n\n<li>Using K-fold cross validation<\/li>\n<\/ul>\n\n\n\n<p>Feb 21 &#8211; Wrote biweekly update &#8211; 2 hours<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the last couple weeks I did some more research on my project. First I evaluated the machine learning algorithms I\u2019d be using. I had intended to use a neural network to classify the network intrusion packets because of its current popularity and strong performance, though I have now decided to use a linear support &hellip; <a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/2025\/02\/22\/bi-weekly-update-1\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Bi-Weekly Update #1&#8221;<\/span><\/a><\/p>\n","protected":false},"author":19356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/posts\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/users\/19356"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":1,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/posts\/10\/revisions"}],"predecessor-version":[{"id":11,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/posts\/10\/revisions\/11"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/media?parent=10"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/categories?post=10"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/haydendunstancsc466\/wp-json\/wp\/v2\/tags?post=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}