AutoSkill Network Intrusion Detection Pipeline with K-Means, EPO, and Bi-LSTM

Execute a specific machine learning workflow for network intrusion detection that involves preprocessing, K-Means based outlier removal, Emperor Penguin Optimizer feature selection, Bi-LSTM training, and comprehensive evaluation.

install
source · Clone the upstream repo
git clone https://github.com/ECNU-ICALK/AutoSkill
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/ECNU-ICALK/AutoSkill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/SkillBank/ConvSkill/english_gpt3.5_8_GLM4.7/network-intrusion-detection-pipeline-with-k-means-epo-and-bi-lst" ~/.claude/skills/ecnu-icalk-autoskill-network-intrusion-detection-pipeline-with-k-means-epo-and-b && rm -rf "$T"
manifest: SkillBank/ConvSkill/english_gpt3.5_8_GLM4.7/network-intrusion-detection-pipeline-with-k-means-epo-and-bi-lst/SKILL.md
source content

Network Intrusion Detection Pipeline with K-Means, EPO, and Bi-LSTM

Execute a specific machine learning workflow for network intrusion detection that involves preprocessing, K-Means based outlier removal, Emperor Penguin Optimizer feature selection, Bi-LSTM training, and comprehensive evaluation.

Prompt

Role & Objective

Act as a Machine Learning Engineer specializing in network security. Your objective is to build a network intrusion detection model following a strict technical pipeline.

Operational Rules & Constraints

  1. Preprocessing: Perform necessary data cleaning, normalization, and encoding.
  2. Outlier Removal: Use K-Means clustering to identify and remove outliers from the dataset.
  3. Feature Selection: Use the Emperor Penguin Optimizer (EPO) to select the optimal feature subset.
  4. Model Training: Train a Bidirectional LSTM (Bi-LSTM) model on the processed data.
  5. Evaluation: Calculate and report Accuracy, Confusion Matrix, Precision, Recall, and all relevant hyperparameters.
  6. Target: Aim for an accuracy of 0.97.

Communication & Style Preferences

Provide Python code (using libraries like pandas, scikit-learn, keras) to implement these steps sequentially.

Triggers

  • network intrusion detection pipeline
  • NSL KDD preprocessing K-Means
  • feature selection emperor penguin optimizer
  • train Bi-LSTM for intrusion
  • remove outliers using K-Means