This is a Demo Server. Data inside this system is only for test purpose.
 

Anomaly detection using network traffic characterization

dc.contributor.advisor Tuğlular, Tuğkan en
dc.contributor.author Yarımtepe, Oğuz
dc.contributor.author Tuğlular, Tuğkan
dc.date.accessioned 2023-11-13T09:44:49Z
dc.date.available 2023-11-13T09:44:49Z
dc.date.issued 2009 en
dc.description Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2009 en
dc.description Includes bibliographical references (leaves: 63-66) en
dc.description Text in English Abstract: Turkish and English en
dc.description ix, 80 leaves en
dc.description.abstract Detecting suspicious traffic and anomaly sources are a general tendency about approaching the traffic analyzing. Since the necessity of detecting anomalies, different approaches are developed with their software candidates. Either event based or signature based anomaly detection mechanism can be applied to analyze network traffic. Signature based approaches require the detected signatures of the past anomalies though event based approaches propose a more flexible approach that is defining application level abnormal anomalies is possible. Both approach focus on the implementing and defining abnormal traffic. The problem about anomaly is that there is not a common definition of anomaly for all protocols or malicious attacks. In this thesis it is aimed to define the non-malicious traffic and extract it, so that the rest is marked as suspicious traffic for further traffic. To achieve this approach, a method and its software application to identify IP sessions, based on statistical metrics of the packet flows are presented. An adaptive network flow knowledge-base is derived. The knowledge-base is constructed using calculated flows attributes. A method to define known traffic is displayed by using the derived flow attributes. By using the attributes, analyzed flow is categorized as a known application level protocol. It is also explained a mathematical model to analyze the undefined traffic to display network traffic anomalies. The mathematical model is based on principle component analysis which is applied on the origindestination pair flows. By using metric based traffic characterization and principle component analysis it is observed that network traffic can be analyzed and some anomalies can be detected. en
dc.identifier.uri http://standard-demo.gcris.com/handle/123456789/5244
dc.language.iso en en_US
dc.publisher Izmir Institute of Technology en
dc.publisher Izmir Institute of Technology en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject.lcc QA76.9.A25 .Y28 2009 en
dc.subject.lcsh Computer security en
dc.subject.lcsh Anomaly detection (Computer security) en
dc.title Anomaly detection using network traffic characterization en_US
dc.type Master Thesis en_US
dspace.entity.type Publication
gdc.author.id TR144185
gdc.author.institutional Yarımtepe, Oğuz
gdc.description.department Computer Engineering en_US
gdc.description.publicationcategory Tez en_US
gdc.oaire.accepatencedate 2009-01-01
gdc.oaire.diamondjournal false
gdc.oaire.impulse 0
gdc.oaire.influence 2.9837197E-9
gdc.oaire.influencealt 0
gdc.oaire.isgreen true
gdc.oaire.keywords Matematik
gdc.oaire.keywords Network security
gdc.oaire.keywords Network flow problems
gdc.oaire.keywords Computer Engineering and Computer Science and Control
gdc.oaire.keywords Mathematics
gdc.oaire.keywords Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol
gdc.oaire.popularity 5.9487604E-10
gdc.oaire.popularityalt 0.0
gdc.oaire.publicfunded false
relation.isAuthorOfPublication 16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isAuthorOfPublication.latestForDiscovery 16066bf2-f189-4d4b-91e8-3fc6cb495163

Files

Collections