Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks

نویسنده

  • Kulsoom Abdullah
چکیده

To my family and in the memory of my father, iii Now the words are over and the pain they bring is gone. Now you have gone to rest in the arms of the Beloved.-Mawlana Jalal ad-Din Muhammad Rumi iv ACKNOWLEDGEMENTS Without the help and blessings of Allah (swt), the completion of this dissertation and overcoming all the obstacles I have encountered along the way would not have been possible. It would also have not been possible without the help of friends, colleagues and those involved in my educational pursuits. First, I want to thank my advisor, Dr. John A. Copeland, for patience, help and concern during my PhD career. He allowed me to have freedom and flexibility in my research choices and helped me every step of the way. Though the time it took me to finish was long, he remained consistently supportive regardless. He is truly one of a kind in character. From him, I learned how to approach research problems and make solutions apply to the real world as well. Thank you for serving on my dissertation committee, giving me feedback and approval of my research goals to help me have a good thesis. I would particularly like to give a special thanks to Dr. Owen for providing feedback and support throughout my time at Georgia Tech and to Dr. John Stasko for providing encouragement and support for the information visualization aspects of IDS Rainstorm. and the rest of the Internet Security staff for testing IDS Rainstorm and providing feedback. The years in the Computer Systems Communication (CSC) lab were full of interesting times and discussions which kept me entertained. Thanks to the present and past members of this group for your friendship. Thanks to Dr. Raheem Beyah at Georgia State, an alumni v of CSC. Not only was he a colleague but he also advised us on our research. For helping me stay together and wade through the administrative sea of bureaucracy, thanks goes to Kathy Cheek. Regards to Brian Strickland for being patient in helping us setup the network in the lab and answering all my questions. I am grateful to Greg Conti for collaborating with me in network security visualization, also providing a lot of feedback and support. Finally, without the support of my family and friends, I could not have completed this thesis. My parents, Syed and Ghazala Abdullah provided me with emotional …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006