Skip to content

Latest commit

 

History

History
7 lines (5 loc) · 298 Bytes

File metadata and controls

7 lines (5 loc) · 298 Bytes

Network-Intrusion-Detection-using-Machine-Learning

Access various ML algorithms then apply the best algorithm (Random Forest) using R.

Please refer the procedure of the project - Final Report.pdf

Book1.csv has the Original Dataset. Book2.csv has modified Dataset with no redundant data.