Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Kamran Saeed, 01-242171-009 | |
dc.date.accessioned | 2019-05-21T06:57:51Z | |
dc.date.available | 2019-05-21T06:57:51Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | http://hdl.handle.net/123456789/8751 | |
dc.description | Supervised By Dr. Muhammad Najam ul Islam | en_US |
dc.description.abstract | Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other’s computers and manipulate personal and sensitive data. Many different techniques have been used in the past to minimize the occurrences of cyber-attacks. These techniques focused primarily on attack modeling by analyzing the incoming traffic in order to look for both malicious activity and attacker objectives. This research proposes a solution that makes use of the attack tree modeling (ATM) along with the development of a correlation engine that predicts coordinated attacks carried out on network servers. The correlation engine uses network flow features i.e. control information about the transmitting content and correlates them based on the previously learned labeling to see if the content is malicious or not. The correlation engine can predict Distributed Denial of Service (DDOS) and Brute-force attacks. These attack categories have been separately modeled using the highest real-time traffic performance algorithm out of Support Vector Machine (SVM), Gaussian Naive Bayes (GNB) and Random Forest Regression (RFR) techniques. The correlation engine tests real-time data and along with the prediction of attacks, it also updates the stored labeling based on system administrator feedback. Once deployed, the correlation engine can be used in realtime on any network or server to continuously monitor and detect zero-day attacks that undermine the integrity of the network or its data | en_US |
dc.language.iso | en | en_US |
dc.publisher | Bahria University Islamabad Campus | en_US |
dc.relation.ispartofseries | MS CE;T-0003 | |
dc.subject | Computer Engineering | en_US |
dc.title | Modeling Cyber Attacks with Empirical Correlation (T-0003) (Old 8315) | en_US |
dc.type | MS Thesis | en_US |