DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS

The integrity of network communications is constantly being challenged by more sophisticated intrusion techniques. Attackers are shifting to stealthier and more complex forms of attacks in an attempt to bypass known mitigation strategies. Also, many detection methods for popular network attacks have...

Full description

Bibliographic Details
Other Authors: Calvert, Chad (author)
Format: Others
Language:English
Published: Florida Atlantic University
Subjects:
Online Access:http://purl.flvc.org/fau/fd/FA00013289
id ndltd-fau.edu-oai-fau.digital.flvc.org-fau_41908
record_format oai_dc
spelling ndltd-fau.edu-oai-fau.digital.flvc.org-fau_419082019-10-17T03:26:52Z DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS FA00013289 Calvert, Chad (author) Khoshgoftaar, Taghi M. (Thesis advisor) Florida Atlantic University (Degree grantor) College of Engineering and Computer Science Department of Computer and Electrical Engineering and Computer Science 179 p. application/pdf Electronic Thesis or Dissertation Text English The integrity of network communications is constantly being challenged by more sophisticated intrusion techniques. Attackers are shifting to stealthier and more complex forms of attacks in an attempt to bypass known mitigation strategies. Also, many detection methods for popular network attacks have been developed using outdated or non-representative attack data. To effectively develop modern detection methodologies, there exists a need to acquire data that can fully encompass the behaviors of persistent and emerging threats. When collecting modern day network traffic for intrusion detection, substantial amounts of traffic can be collected, much of which consists of relatively few attack instances as compared to normal traffic. This skewed distribution between normal and attack data can lead to high levels of class imbalance. Machine learning techniques can be used to aid in attack detection, but large levels of imbalance between normal (majority) and attack (minority) instances can lead to inaccurate detection results. Florida Atlantic University Machine learning Algorithms Anomaly detection (Computer security) Intrusion detection systems (Computer security) Big data Includes bibliography. Dissertation (Ph.D.)--Florida Atlantic University, 2019. FAU Electronic Theses and Dissertations Collection Copyright © is held by the author with permission granted to Florida Atlantic University to digitize, archive and distribute this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder. http://purl.flvc.org/fau/fd/FA00013289 http://rightsstatements.org/vocab/InC/1.0/ https://fau.digital.flvc.org/islandora/object/fau%3A41908/datastream/TN/view/DATA%20COLLECTION%20FRAMEWORK%20AND%20MACHINE%20LEARNING%20ALGORITHMS%20FOR%20THE%20ANALYSIS%20OF%20CYBER%20SECURITY%20ATTACKS.jpg
collection NDLTD
language English
format Others
sources NDLTD
topic Machine learning
Algorithms
Anomaly detection (Computer security)
Intrusion detection systems (Computer security)
Big data
spellingShingle Machine learning
Algorithms
Anomaly detection (Computer security)
Intrusion detection systems (Computer security)
Big data
DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
description The integrity of network communications is constantly being challenged by more sophisticated intrusion techniques. Attackers are shifting to stealthier and more complex forms of attacks in an attempt to bypass known mitigation strategies. Also, many detection methods for popular network attacks have been developed using outdated or non-representative attack data. To effectively develop modern detection methodologies, there exists a need to acquire data that can fully encompass the behaviors of persistent and emerging threats. When collecting modern day network traffic for intrusion detection, substantial amounts of traffic can be collected, much of which consists of relatively few attack instances as compared to normal traffic. This skewed distribution between normal and attack data can lead to high levels of class imbalance. Machine learning techniques can be used to aid in attack detection, but large levels of imbalance between normal (majority) and attack (minority) instances can lead to inaccurate detection results. === Includes bibliography. === Dissertation (Ph.D.)--Florida Atlantic University, 2019. === FAU Electronic Theses and Dissertations Collection
author2 Calvert, Chad (author)
author_facet Calvert, Chad (author)
title DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
title_short DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
title_full DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
title_fullStr DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
title_full_unstemmed DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
title_sort data collection framework and machine learning algorithms for the analysis of cyber security attacks
publisher Florida Atlantic University
url http://purl.flvc.org/fau/fd/FA00013289
_version_ 1719269923870474240