Network-Intrusion-Detection-using-Machine-Learning Access various ML algorithms then apply the best algorithm (Random Forest) using R. Please refer the procedure of the project - Final Report.pdf Book1.csv has the Original Dataset. Book2.csv has modified Dataset with no redundant data.