Detecting Network Exposures through Risk Evaluationand Traffic Analysis
博士 === 國立臺灣大學 === 電機工程學研究所 === 106 === This dissertation dives into basic principles of network defense, concepts of threat hunting, covers several case studies of proactive detection and techniques that can be used for a scalable detection of network exposures within network infrastructure. Managin...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/84bnkd |
id |
ndltd-TW-106NTU05442069 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NTU054420692019-05-30T03:50:56Z http://ndltd.ncl.edu.tw/handle/84bnkd Detecting Network Exposures through Risk Evaluationand Traffic Analysis 通過風險評估和流量分析來檢測網絡暴露 Fyodor Yarochkin 費爾德 博士 國立臺灣大學 電機工程學研究所 106 This dissertation dives into basic principles of network defense, concepts of threat hunting, covers several case studies of proactive detection and techniques that can be used for a scalable detection of network exposures within network infrastructure. Managing risk and exposure levels is the primary objective of an Information Security Program within a large organization. Managing security risks at a country-wide level is a primary objective of any National Computer Emergency Response Team(CERT) or a Computer Security Incident Response Team (CSIRT). With this work we aim at improving the process of timely detection of network exposures and adversary activities at earlier stages. Threat hunting and proactive detection aims at shortening time between network breach and detection of such breach. This approach is particularly effective in cases when the adversary intentionally evades traditional security products. This work helps to automate selected tasks in the domains of proactive monitoring, detection and threat hunting. A scalable cloudbased platform was designed and implemented in order to cope with massive amount of data to be processed, stored and analyzed. In this study we try to understand methods of a large network risk evaluation and conduct practical experiments using a large network datasets. The main contribution of this work is to demonstrate how threat hunting and several non-intrusive methods of a large network infrastructure reconnaissance could be used to measure risk and network vulnerability exposures within the analyzed network. Kuo Sy-Yen 郭斯彥 2018 學位論文 ; thesis 170 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立臺灣大學 === 電機工程學研究所 === 106 === This dissertation dives into basic principles of network defense, concepts of threat hunting, covers several case studies of proactive detection and techniques that can be used for a scalable detection of network exposures within network infrastructure.
Managing risk and exposure levels is the primary objective of an Information Security Program within a large organization. Managing security risks at a country-wide level is a primary objective of any National Computer Emergency Response Team(CERT) or a Computer Security Incident Response Team (CSIRT).
With this work we aim at improving the process of timely detection of network exposures and adversary activities at earlier stages. Threat hunting and proactive
detection aims at shortening time between network breach and detection of such breach. This approach is particularly effective in cases when the adversary intentionally evades traditional security products. This work helps to automate selected tasks in the domains of proactive monitoring, detection and threat hunting. A scalable cloudbased
platform was designed and implemented in order to cope with massive amount of data to be processed, stored and analyzed. In this study we try to understand methods
of a large network risk evaluation and conduct practical experiments using a large network datasets. The main contribution of this work is to demonstrate how threat
hunting and several non-intrusive methods of a large network infrastructure reconnaissance could be used to measure risk and network vulnerability exposures within
the analyzed network.
|
author2 |
Kuo Sy-Yen |
author_facet |
Kuo Sy-Yen Fyodor Yarochkin 費爾德 |
author |
Fyodor Yarochkin 費爾德 |
spellingShingle |
Fyodor Yarochkin 費爾德 Detecting Network Exposures through Risk Evaluationand Traffic Analysis |
author_sort |
Fyodor Yarochkin |
title |
Detecting Network Exposures through Risk Evaluationand Traffic Analysis |
title_short |
Detecting Network Exposures through Risk Evaluationand Traffic Analysis |
title_full |
Detecting Network Exposures through Risk Evaluationand Traffic Analysis |
title_fullStr |
Detecting Network Exposures through Risk Evaluationand Traffic Analysis |
title_full_unstemmed |
Detecting Network Exposures through Risk Evaluationand Traffic Analysis |
title_sort |
detecting network exposures through risk evaluationand traffic analysis |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/84bnkd |
work_keys_str_mv |
AT fyodoryarochkin detectingnetworkexposuresthroughriskevaluationandtrafficanalysis AT fèiěrdé detectingnetworkexposuresthroughriskevaluationandtrafficanalysis AT fyodoryarochkin tōngguòfēngxiǎnpínggūhéliúliàngfēnxīláijiǎncèwǎngluòbàolù AT fèiěrdé tōngguòfēngxiǎnpínggūhéliúliàngfēnxīláijiǎncèwǎngluòbàolù |
_version_ |
1719196001062879232 |