Using RNN for Cyberattack Detection in a Network Log System with Data Visualization

碩士 === 東海大學 === 資訊工程學系 === 107 === In recent years, information security issues have become more and more discussed, from the OpenSSL Heartbleed vulnerability, the hacking of the US Morgan Bank information system, and the DDoS threats GitHub encountered. The purpose of this paper is to provide a net...

Full description

Bibliographic Details
Main Authors: JIANG, WEI-JE, 江瑋哲
Other Authors: YANG, CHAO-TUNG
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/4na65g
id ndltd-TW-107THU00394019
record_format oai_dc
spelling ndltd-TW-107THU003940192019-10-23T05:45:30Z http://ndltd.ncl.edu.tw/handle/4na65g Using RNN for Cyberattack Detection in a Network Log System with Data Visualization 運用RNN執行攻擊檢測與建置即時巨量日誌儲存系統之視覺化分析應用 JIANG, WEI-JE 江瑋哲 碩士 東海大學 資訊工程學系 107 In recent years, information security issues have become more and more discussed, from the OpenSSL Heartbleed vulnerability, the hacking of the US Morgan Bank information system, and the DDoS threats GitHub encountered. The purpose of this paper is to provide a network log management system that allows for further visual analysis of all types of users. The system uses ELK Stack technology, and the data analysis part is to filter, analyze and analyze the log data according to the analysis purpose required, and finally visually present it on the web browser. The services of the system are mainly Elasticsearch, Logstash and Kibana, which provide a network log management and visual analysis service. The network attack detection part uses the deep learning model for learning and training, so that the model can learn the characteristics of each attack by known network attack features. The ultimate goal of this paper is to use visual analysis to present various customized Network Log related graphics, and use the relevant resources of the school computer center to filter out important network information, such as source location and cyberattack related behavior. In the paper, the results of deep learning are the classification of attack behavior using RNN model. Different models are used for training and testing comparison, including DNN and LSTM, to find out which model is more suitable for the experimental data in this paper. YANG, CHAO-TUNG LIU, JUNG-CHUN 楊朝棟 劉榮春 2019 學位論文 ; thesis 66 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 東海大學 === 資訊工程學系 === 107 === In recent years, information security issues have become more and more discussed, from the OpenSSL Heartbleed vulnerability, the hacking of the US Morgan Bank information system, and the DDoS threats GitHub encountered. The purpose of this paper is to provide a network log management system that allows for further visual analysis of all types of users. The system uses ELK Stack technology, and the data analysis part is to filter, analyze and analyze the log data according to the analysis purpose required, and finally visually present it on the web browser. The services of the system are mainly Elasticsearch, Logstash and Kibana, which provide a network log management and visual analysis service. The network attack detection part uses the deep learning model for learning and training, so that the model can learn the characteristics of each attack by known network attack features. The ultimate goal of this paper is to use visual analysis to present various customized Network Log related graphics, and use the relevant resources of the school computer center to filter out important network information, such as source location and cyberattack related behavior. In the paper, the results of deep learning are the classification of attack behavior using RNN model. Different models are used for training and testing comparison, including DNN and LSTM, to find out which model is more suitable for the experimental data in this paper.
author2 YANG, CHAO-TUNG
author_facet YANG, CHAO-TUNG
JIANG, WEI-JE
江瑋哲
author JIANG, WEI-JE
江瑋哲
spellingShingle JIANG, WEI-JE
江瑋哲
Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
author_sort JIANG, WEI-JE
title Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
title_short Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
title_full Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
title_fullStr Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
title_full_unstemmed Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
title_sort using rnn for cyberattack detection in a network log system with data visualization
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/4na65g
work_keys_str_mv AT jiangweije usingrnnforcyberattackdetectioninanetworklogsystemwithdatavisualization
AT jiāngwěizhé usingrnnforcyberattackdetectioninanetworklogsystemwithdatavisualization
AT jiangweije yùnyòngrnnzhíxínggōngjījiǎncèyǔjiànzhìjíshíjùliàngrìzhìchǔcúnxìtǒngzhīshìjuéhuàfēnxīyīngyòng
AT jiāngwěizhé yùnyòngrnnzhíxínggōngjījiǎncèyǔjiànzhìjíshíjùliàngrìzhìchǔcúnxìtǒngzhīshìjuéhuàfēnxīyīngyòng
_version_ 1719275548523364352