Using RNN for Cyberattack Detection in a Network Log System with Data Visualization
碩士 === 東海大學 === 資訊工程學系 === 107 === In recent years, information security issues have become more and more discussed, from the OpenSSL Heartbleed vulnerability, the hacking of the US Morgan Bank information system, and the DDoS threats GitHub encountered. The purpose of this paper is to provide a net...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/4na65g |
id |
ndltd-TW-107THU00394019 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107THU003940192019-10-23T05:45:30Z http://ndltd.ncl.edu.tw/handle/4na65g Using RNN for Cyberattack Detection in a Network Log System with Data Visualization 運用RNN執行攻擊檢測與建置即時巨量日誌儲存系統之視覺化分析應用 JIANG, WEI-JE 江瑋哲 碩士 東海大學 資訊工程學系 107 In recent years, information security issues have become more and more discussed, from the OpenSSL Heartbleed vulnerability, the hacking of the US Morgan Bank information system, and the DDoS threats GitHub encountered. The purpose of this paper is to provide a network log management system that allows for further visual analysis of all types of users. The system uses ELK Stack technology, and the data analysis part is to filter, analyze and analyze the log data according to the analysis purpose required, and finally visually present it on the web browser. The services of the system are mainly Elasticsearch, Logstash and Kibana, which provide a network log management and visual analysis service. The network attack detection part uses the deep learning model for learning and training, so that the model can learn the characteristics of each attack by known network attack features. The ultimate goal of this paper is to use visual analysis to present various customized Network Log related graphics, and use the relevant resources of the school computer center to filter out important network information, such as source location and cyberattack related behavior. In the paper, the results of deep learning are the classification of attack behavior using RNN model. Different models are used for training and testing comparison, including DNN and LSTM, to find out which model is more suitable for the experimental data in this paper. YANG, CHAO-TUNG LIU, JUNG-CHUN 楊朝棟 劉榮春 2019 學位論文 ; thesis 66 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東海大學 === 資訊工程學系 === 107 === In recent years, information security issues have become more and more discussed, from the OpenSSL Heartbleed vulnerability, the hacking of the US Morgan Bank information system, and the DDoS threats GitHub encountered. The purpose of this paper is to provide a network log management system that allows for further visual analysis of all types of users. The system uses ELK Stack technology, and the data analysis part is to filter, analyze and analyze the log data according to the analysis purpose required, and finally visually present it on the web browser. The services of the system are mainly Elasticsearch, Logstash and Kibana, which provide a network log management and visual analysis service. The network attack detection part uses the deep learning model for learning and training, so that the model can learn the characteristics of each attack by known network attack features. The ultimate goal of this paper is to use visual analysis to present various customized Network Log related graphics, and use the relevant resources of the school computer center to filter out important network information, such as source location and cyberattack related behavior. In the paper, the results of deep learning are the classification of attack behavior using RNN model. Different models are used for training and testing comparison, including DNN and LSTM, to find out which model is more suitable for the experimental data in this paper.
|
author2 |
YANG, CHAO-TUNG |
author_facet |
YANG, CHAO-TUNG JIANG, WEI-JE 江瑋哲 |
author |
JIANG, WEI-JE 江瑋哲 |
spellingShingle |
JIANG, WEI-JE 江瑋哲 Using RNN for Cyberattack Detection in a Network Log System with Data Visualization |
author_sort |
JIANG, WEI-JE |
title |
Using RNN for Cyberattack Detection in a Network Log System with Data Visualization |
title_short |
Using RNN for Cyberattack Detection in a Network Log System with Data Visualization |
title_full |
Using RNN for Cyberattack Detection in a Network Log System with Data Visualization |
title_fullStr |
Using RNN for Cyberattack Detection in a Network Log System with Data Visualization |
title_full_unstemmed |
Using RNN for Cyberattack Detection in a Network Log System with Data Visualization |
title_sort |
using rnn for cyberattack detection in a network log system with data visualization |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/4na65g |
work_keys_str_mv |
AT jiangweije usingrnnforcyberattackdetectioninanetworklogsystemwithdatavisualization AT jiāngwěizhé usingrnnforcyberattackdetectioninanetworklogsystemwithdatavisualization AT jiangweije yùnyòngrnnzhíxínggōngjījiǎncèyǔjiànzhìjíshíjùliàngrìzhìchǔcúnxìtǒngzhīshìjuéhuàfēnxīyīngyòng AT jiāngwěizhé yùnyòngrnnzhíxínggōngjījiǎncèyǔjiànzhìjíshíjùliàngrìzhìchǔcúnxìtǒngzhīshìjuéhuàfēnxīyīngyòng |
_version_ |
1719275548523364352 |