Font Size: a A A

Analyzing cyber-attacks using feature similarity: A flow based detection approach

Posted on:2016-01-29Degree:M.SType:Thesis
University:University of Maryland, Baltimore CountyCandidate:Kawatkar, Adwait SatishFull Text:PDF
GTID:2478390017480808Subject:Information Science
Abstract/Summary:PDF Full Text Request
The advancements and improvement in network technology has given rise to new challenges in cyber- security, by increasing the risk of cyber-attacks. Intruders are exploiting vulnerabilities to devise novel and unknown cyber-attacks to perform malicious activities. Due to increasing network traffic the current packet-based Intrusion Detection Systems (IDSs) spend significant amount of time analyzing packets to detect intrusions. This thesis attempts to identify relevancy between cyber-attacks using binary similarity coefficients using a network flow based approach. A network flow is a sequence of packets between a given source and destination in one direction only that share certain characteristics. The discovery of relevancy between attacks in network flows helps in correlating the suspicious attack events, as it is measured by similarity coefficients. A prototype system has been implemented and evaluated using several similarity coefficients for suspicious events to identify incoming cyber-attacks.
Keywords/Search Tags:Cyber-attacks, Using, Similarity, Network, Flow
PDF Full Text Request
Related items