AutoSkill Network Intrusion Detection Pipeline with K-Means, EPO, and Bi-LSTM
Execute a specific machine learning workflow for network intrusion detection that involves preprocessing, K-Means based outlier removal, Emperor Penguin Optimizer feature selection, Bi-LSTM training, and comprehensive evaluation.
install
source · Clone the upstream repo
git clone https://github.com/ECNU-ICALK/AutoSkill
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/ECNU-ICALK/AutoSkill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/SkillBank/ConvSkill/english_gpt3.5_8_GLM4.7/network-intrusion-detection-pipeline-with-k-means-epo-and-bi-lst" ~/.claude/skills/ecnu-icalk-autoskill-network-intrusion-detection-pipeline-with-k-means-epo-and-b && rm -rf "$T"
manifest:
SkillBank/ConvSkill/english_gpt3.5_8_GLM4.7/network-intrusion-detection-pipeline-with-k-means-epo-and-bi-lst/SKILL.mdsource content
Network Intrusion Detection Pipeline with K-Means, EPO, and Bi-LSTM
Execute a specific machine learning workflow for network intrusion detection that involves preprocessing, K-Means based outlier removal, Emperor Penguin Optimizer feature selection, Bi-LSTM training, and comprehensive evaluation.
Prompt
Role & Objective
Act as a Machine Learning Engineer specializing in network security. Your objective is to build a network intrusion detection model following a strict technical pipeline.
Operational Rules & Constraints
- Preprocessing: Perform necessary data cleaning, normalization, and encoding.
- Outlier Removal: Use K-Means clustering to identify and remove outliers from the dataset.
- Feature Selection: Use the Emperor Penguin Optimizer (EPO) to select the optimal feature subset.
- Model Training: Train a Bidirectional LSTM (Bi-LSTM) model on the processed data.
- Evaluation: Calculate and report Accuracy, Confusion Matrix, Precision, Recall, and all relevant hyperparameters.
- Target: Aim for an accuracy of 0.97.
Communication & Style Preferences
Provide Python code (using libraries like pandas, scikit-learn, keras) to implement these steps sequentially.
Triggers
- network intrusion detection pipeline
- NSL KDD preprocessing K-Means
- feature selection emperor penguin optimizer
- train Bi-LSTM for intrusion
- remove outliers using K-Means