Modeling Cyber Attacks with Empirical Correlation (T-0003) (Old 8315)

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Kamran Saeed, 01-242171-009
dc.date.accessioned 2019-05-21T06:57:51Z
dc.date.available 2019-05-21T06:57:51Z
dc.date.issued 2019
dc.identifier.uri http://hdl.handle.net/123456789/8751
dc.description Supervised By Dr. Muhammad Najam ul Islam en_US
dc.description.abstract Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other’s computers and manipulate personal and sensitive data. Many different techniques have been used in the past to minimize the occurrences of cyber-attacks. These techniques focused primarily on attack modeling by analyzing the incoming traffic in order to look for both malicious activity and attacker objectives. This research proposes a solution that makes use of the attack tree modeling (ATM) along with the development of a correlation engine that predicts coordinated attacks carried out on network servers. The correlation engine uses network flow features i.e. control information about the transmitting content and correlates them based on the previously learned labeling to see if the content is malicious or not. The correlation engine can predict Distributed Denial of Service (DDOS) and Brute-force attacks. These attack categories have been separately modeled using the highest real-time traffic performance algorithm out of Support Vector Machine (SVM), Gaussian Naive Bayes (GNB) and Random Forest Regression (RFR) techniques. The correlation engine tests real-time data and along with the prediction of attacks, it also updates the stored labeling based on system administrator feedback. Once deployed, the correlation engine can be used in realtime on any network or server to continuously monitor and detect zero-day attacks that undermine the integrity of the network or its data en_US
dc.language.iso en en_US
dc.publisher Bahria University Islamabad Campus en_US
dc.relation.ispartofseries MS CE;T-0003
dc.subject Computer Engineering en_US
dc.title Modeling Cyber Attacks with Empirical Correlation (T-0003) (Old 8315) en_US
dc.type MS Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account