Project members
- Phạm Công Lập (Clap)
- Nguyễn Trần Trung Nguyên
- Lương Hồ Trọng Nghĩa
Application Layer in OSI Model
There are three main types of clouds: private cloud, public cloud, and hybrid cloud.
-
private cloud: Controlled and created within a business.
-
public cloud: Controlled by the company providing cloud services, usually a business that sells cloud services.
-
hybrid cloud: A combination of both public and private cloud
If you do not want to use python 3.8, you can use another version of python, then go here to modify the version.
But the best way to avoid library and code conflicts is to use libraries like ours in this project
Figure 1: Config python version
Here is an example if you want to change version
Figure 2: Example to config python version
You must download the dataset in Datasets/about.md, in this file there will be a link to the original dataset for you to download.
To run this project you must download the necessary libraries for python
Figure 3: Python libraries required to run this project
You must download all the libraries as shown in the picture. To avoid library conflicts, please go to our Requirements.txt file to view.
After you download all the above libraries, we proceed to the next step
cd web
npm install
.\run.bat (powershell)
or
run.bat (command prompt)
Then open your browser and access: http://localhost:4000/
Figure 4: UI of web attack detection
Then go to the predict.txt file to get a benign or malware example to enter for machine detection
Figure 5: Your request is benign
After you press the predict button, the machine will predict for you whether the result of this request is malware or benign
If your request is benign then when you click ok it will forward you to our website, if your request is malware it will block you
when you click ok then it will forward you to the main website
Figure 6: Your website
We do use authentication and authorization for this site, you can see this in our code
You can create a new user account
And now I will provide you with 2 user and admin accounts so you can test
This is the user's account
user
123123
This is the admin's account
admin
123123
Figure 7: User's website
Figure 8: Admin's website
Figure 9: Project architecture
[1]. S. Kautish, R. A and A. Vidyarthi, "SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment," in IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6455-6463, Sept. 2022, doi: 10.1109/TII.2022.3146290.
[2]. Lavian, S., & Ariel University, Ariel Cyber Innovation Center (ACIC). (2023). The API Traffic Research Dataset Framework (ATRDF) [Data set]. https://github.com/ArielCyber/Cisco_Ariel_Uni_API_security_challenge
[3]. https://learn.microsoft.com/en-us/azure/architecture/guide/architecture-styles/microservices
[4]. https://github.com/mandar196/Fake_News_Classifier_NLP