diff --git a/Documents/3 Chapters (Mohab Sameh Ibrahim Abdel-Wahab 180879).pdf b/Documents/3 Chapters (Mohab Sameh Ibrahim Abdel-Wahab 180879).pdf new file mode 100644 index 0000000..82b7060 Binary files /dev/null and b/Documents/3 Chapters (Mohab Sameh Ibrahim Abdel-Wahab 180879).pdf differ diff --git a/Documents/DELL EMC - Envision The Future First Presentation (Not Animated).pdf b/Documents/DELL EMC - Envision The Future First Presentation (Not Animated).pdf new file mode 100644 index 0000000..4c7c324 Binary files /dev/null and b/Documents/DELL EMC - Envision The Future First Presentation (Not Animated).pdf differ diff --git a/Documents/Interim Progress Report.pdf b/Documents/Interim Progress Report.pdf new file mode 100644 index 0000000..4cb75fa Binary files /dev/null and b/Documents/Interim Progress Report.pdf differ diff --git a/Documents/Intrusion_System_Survey.csv b/Documents/Intrusion_System_Survey.csv new file mode 100644 index 0000000..23819eb --- /dev/null +++ b/Documents/Intrusion_System_Survey.csv @@ -0,0 +1,28 @@ +"Timestamp","Full Name","Email Address","LinkedIn Profile","Phone number","Nationality","Current Job ","How Familiar are you with Computer Science ?","How Familiar are you with Networking & Security ?","How Familiar are you with Machine & Deep Learning ?","Does your system suffer from network attacks ?","Does your organization have an Intrusion Detection System (IDS) ?","Does your organization have a firewall ?","Is your system's Firewall or IDS able to completely stop / detect these network attacks ?","Is the IDS important for your system's security ?","Is it important to enhance current popular IDSs to give better user experience and Security ?","Is it Important to enhance methods used by IDS to stop network attacks ?","Is better to develop behavior-based IDS alongside existing traditional signature-based IDSs ?","Is it appropriate and effective to use Machine learning & Deep learning in IDS to detect Malicious Attacks ? ","Is It Important for an IDS that utilizes machine learning & deep learning methods to use Realtime packet stream to improve accuracy and detect new patterns ?","Do you think it is important to develop a workbench that helps in the research and development of such Machine Learning based and Deep Learning based IDSs ?","Comments" +"2021/03/07 10:12:06 PM GMT+2","Moataz samir","moatazsamir16@gmail.com","Linkedin.com/moataz_samir","01144466365","Egyptian","Technical support Engineer 1","Highly Knowledgable","Basic Background","Moderate Knowledge","3","Yes","Yes","Yes","5","5","5","Yes","5","5","5","" +"2021/03/07 10:16:59 PM GMT+2","Shaimaa Ward","shimo.ward@gmail.com","https://www.linkedin.com/in/shaimaa-ward","01003878426","Egyptian","Business Analyst","Expert within the Field","Moderate Knowledge","Basic Background","4","Yes","Yes","Yes","5","5","5","Yes","4","5","3","" +"2021/03/07 10:31:51 PM GMT+2","mahmoud abd elrazek","mahmood.abdelrazek@outlook.com","https://www.linkedin.com/in/mahmood-abdelrazek-ali-26026715a/","","Egyptian","Student","Highly Knowledgable","Basic Background","Moderate Knowledge","5","No","No","No","5","5","5","Yes","5","5","5","" +"2021/03/07 10:53:33 PM GMT+2","Tamer Helmy","tamer.helmy@gmail.com","https://www.linkedin.com/in/tamerhelmy","","Egyptian","Test Architect","Expert within the Field","Moderate Knowledge","Basic Background","2","Yes","Yes","No","3","2","3","Yes","3","3","4","" +"2021/03/07 11:07:11 PM GMT+2","Mostafa Hashish","mostafa.hashish@docusign.com","www.linkedin.com/in/mostafa-hashish","","Egyptian","IT Compliance and Risk Management","Highly Knowledgable","Highly Knowledgable","Moderate Knowledge","4","Yes","Yes","Yes","5","5","5","Yes","4","4","3","" +"2021/03/08 2:20:42 AM GMT+2","Mahmoud El-Shafey","mah.ahmed.elshafey@gmail.com","MahmoudEl-Shafey","","Egyptian","Software Developer","Expert within the Field","Moderate Knowledge","Highly Knowledgable","4","Yes","Yes","Yes","5","5","5","Yes","5","5","5","" +"2021/03/08 7:34:12 AM GMT+2","Karim Mohamed","karim.m.elsaied@gmail.com","Karim Mohamed Elsayed ","","Egyptian","SAP application developer","Expert within the Field","Basic Background","No Background","1","Yes","Yes","Yes","5","3","3","Yes","5","5","5","" +"2021/03/09 12:07:22 PM GMT+2","Mostafa Ramadan Awad Aboelghait ","mostafa.ramadan1@msa.edu.eg","http://linkedin.com/in/mostafa-ramadan-b76591172","01147317266","Egyptian","Student","Highly Knowledgable","Basic Background","Moderate Knowledge","3","No","Yes","No","5","5","5","Yes","5","5","5","" +"2021/03/10 2:13:59 PM GMT+2","Mostafa Amgad","mostafa.amgad@msa.edu.eg","http://linkedin.com/in/mostafa-eweida","01006485633","Egyptian ","Student","Moderate Knowledge","Basic Background","No Background","1","No","No","No","5","4","5","Yes","5","5","3","" +"2021/03/14 3:22:09 PM GMT+2","Rana Muhammed Abdelsalam","ranaamuhhamed@gmail.com","https://www.linkedin.com/in/rana-muhammed/","","Egyptian","Software Developer","Moderate Knowledge","Moderate Knowledge","Moderate Knowledge","3","Yes","Yes","Yes","4","4","4","Yes","3","4","4","" +"2021/03/31 4:14:22 PM GMT+2","Kareem Alaa ","kareem.alaa2@msa.edu.eg","Kareem Elagroudy","01110906543","Egyptian ","Student","Moderate Knowledge","Basic Background","Basic Background","5","No","No","No","5","5","5","Yes","5","5","5","" +"2021/03/31 4:18:35 PM GMT+2","Fawzy Ahmed Mohamed","fawzy.fawzy46@gmail.com","https://twitter.com/fawzyahmed46","","Egyptian ","Student","Expert within the Field","Expert within the Field","Highly Knowledgable","3","Yes","Yes","No","5","5","5","Yes","5","5","4","" +"2021/03/31 4:35:53 PM GMT+2","Omar Ahmad Abdalaziz","oa199919@gmail.com","https://www.facebook.com/omar.ahmed.39108297","01281999280","Egyptian","Student","Highly Knowledgable","Moderate Knowledge","Highly Knowledgable","3","No","Yes","No","4","4","4","Yes","5","4","5","" +"2021/03/31 4:40:27 PM GMT+2","Omar Wally","omarwaly98@hotmail.com","https://www.linkedin.com/in/omar-wally/","01006508638","Egyptian","Student","Highly Knowledgable","Basic Background","Highly Knowledgable","2","No","Yes","No","4","4","5","Yes","5","5","4","" +"2021/03/31 4:42:44 PM GMT+2","Mostafa Touny","mostafatouny@protonmail.com","https://www.facebook.com/mostafatounyX/","01097978612","Egypt","Student","Highly Knowledgable","Highly Knowledgable","Highly Knowledgable","4","Yes","Yes","No","5","4","5","Yes","5","4","5","" +"2021/03/31 4:42:49 PM GMT+2","Mostafa elsayed mahmoud ","bicomody@gmail.com","jaycelol1000@gmail.com","01146525896","Egyption","Student","Highly Knowledgable","Highly Knowledgable","Highly Knowledgable","4","Yes","Yes","No","5","4","5","Yes","5","4","5","Promising works" +"2021/03/31 4:50:59 PM GMT+2","mohamed ahmee","mohamed.ahmed149@msa.edu.eg","mohamed","01152930696","Egyptian","Student","Highly Knowledgable","Moderate Knowledge","Highly Knowledgable","4","No","Yes","No","5","5","5","No","4","4","5","" +"2021/03/31 4:58:39 PM GMT+2","SeifEldin Hesham Mohamed ","saifel-deen.hesham@msa.edu.eg","https://m.facebook.com/saif.hesham.50","01014720706","Egyptian","Student","Moderate Knowledge","No Background","Basic Background","3","No","No","No","4","5","4","Yes","5","4","5","" +"2021/03/31 5:05:57 PM GMT+2","Ahmed alaa almokadem","ahmed.alaa17@msa.edu.eg","Elmokadem089@gmail.com","01113941435","Egyptian ","Student","Moderate Knowledge","Highly Knowledgable","Highly Knowledgable","4","No","Yes","No","4","5","5","Yes","4","5","5","" +"2021/03/31 5:33:09 PM GMT+2","Hassan Mohamed Nabil ElBagouri","hbagouri@gmail.com","hassan.elbagouri","01124030303","Egyptian","Student","Basic Background","Basic Background","Basic Background","3","No","Yes","No","3","4","5","Yes","4","5","5","" +"2021/04/01 12:12:22 AM GMT+2","Khalid Aldughayem","kaldughayem@gmail.com","Khalid dg","","Saudi Arabia ","Governmental Agency Representative","Highly Knowledgable","Expert within the Field","Highly Knowledgable","5","Yes","Yes","Yes","5","4","5","Yes","4","5","5","Very good survey, my only comments are stop asking for a lot of information in the beginning because security professionals will think this is a way to phish for information about their current network or about them and they are paranoid by job requirements. + +As for machine learning in IDS, contact Palo Alto they are the only vendors so far offering ML in IDSs, wildfire as well is employing that in their systems. + +Another thing of interest might be malicious behavior detection or malicious files detection using machine learning." +"2021/04/01 12:21:29 AM GMT+2","Mohammed ahmed abdelmaksoud","mohammeda.maksoud@gmail.com","Mohamedmaksoud","01143610667","Egyptian","Quality engineer","Highly Knowledgable","Basic Background","No Background","1","Yes","Yes","Yes","3","4","4","Yes","4","3","4","" +"2021/04/01 3:10:28 AM GMT+2","Feng Lei","fenglei1574@gmail.com","https://www.linkedin.com/in/lei-feng-030982199/","+8617316741881","China","Student","No Background","Basic Background","No Background","2","No","Yes","Yes","1","1","1","No","1","1","1","" \ No newline at end of file diff --git a/Implementation/streamlit-demo/Datasets/Thursday-WorkingHours-Afternoon-Infilteration.csv b/Implementation/app-files/Datasets/Thursday-WorkingHours-Afternoon-Infilteration.csv similarity index 100% rename from Implementation/streamlit-demo/Datasets/Thursday-WorkingHours-Afternoon-Infilteration.csv rename to Implementation/app-files/Datasets/Thursday-WorkingHours-Afternoon-Infilteration.csv diff --git a/Implementation/streamlit-demo/Datasets/kddcup99.csv b/Implementation/app-files/Datasets/kddcup99.csv similarity index 100% rename from Implementation/streamlit-demo/Datasets/kddcup99.csv rename to Implementation/app-files/Datasets/kddcup99.csv diff --git a/Implementation/streamlit-demo/Datasets/packet_capture.csv b/Implementation/app-files/Datasets/packet_capture.csv similarity index 100% rename from Implementation/streamlit-demo/Datasets/packet_capture.csv rename to Implementation/app-files/Datasets/packet_capture.csv diff --git a/Implementation/streamlit-demo/app.py b/Implementation/app-files/app.py similarity index 100% rename from Implementation/streamlit-demo/app.py rename to Implementation/app-files/app.py diff --git a/Implementation/streamlit-demo/requirements.txt b/Implementation/app-files/requirements.txt similarity index 100% rename from Implementation/streamlit-demo/requirements.txt rename to Implementation/app-files/requirements.txt diff --git a/Implementation/ISCX-Practice (DoS Only).ipynb b/Implementation/jupyter-notebooks/ISCX-Practice (DoS Only).ipynb similarity index 100% rename from Implementation/ISCX-Practice (DoS Only).ipynb rename to Implementation/jupyter-notebooks/ISCX-Practice (DoS Only).ipynb diff --git a/Implementation/ISCX-Practice-Full-Dataset.ipynb b/Implementation/jupyter-notebooks/ISCX-Practice-Full-Dataset.ipynb similarity index 100% rename from Implementation/ISCX-Practice-Full-Dataset.ipynb rename to Implementation/jupyter-notebooks/ISCX-Practice-Full-Dataset.ipynb diff --git a/Implementation/kdd99-Practice-Full-Dataset.ipynb b/Implementation/jupyter-notebooks/kdd99-Practice-Full-Dataset.ipynb similarity index 100% rename from Implementation/kdd99-Practice-Full-Dataset.ipynb rename to Implementation/jupyter-notebooks/kdd99-Practice-Full-Dataset.ipynb diff --git a/Implementation/kdd99-Practice.ipynb b/Implementation/jupyter-notebooks/kdd99-Practice.ipynb similarity index 100% rename from Implementation/kdd99-Practice.ipynb rename to Implementation/jupyter-notebooks/kdd99-Practice.ipynb diff --git a/Implementation/kdd99-various-models.ipynb b/Implementation/jupyter-notebooks/kdd99-various-models.ipynb similarity index 100% rename from Implementation/kdd99-various-models.ipynb rename to Implementation/jupyter-notebooks/kdd99-various-models.ipynb diff --git a/Implementation/kddcup.data_10_percent.gz b/Implementation/jupyter-notebooks/kddcup.data_10_percent.gz similarity index 100% rename from Implementation/kddcup.data_10_percent.gz rename to Implementation/jupyter-notebooks/kddcup.data_10_percent.gz diff --git a/Implementation/streamlit-demo/data/example.gif b/Implementation/streamlit-demo/data/example.gif deleted file mode 100644 index 3cbac8d..0000000 Binary files a/Implementation/streamlit-demo/data/example.gif and /dev/null differ