Internet traffic analysis

This report presents two models that are used to detect the user abnormal behavior and network intrusion respectively. The user abnormal behavior detection model uses the pattern-matching techniques to identify the user. The intrusion detection model detects intrusion based on known intrusion patter...

Full description

Saved in:
Bibliographic Details
Main Author: Gui, Shengyu
Other Authors: Tan Yap Peng
Format: Final Year Project
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/60991
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-60991
record_format dspace
spelling sg-ntu-dr.10356-609912023-07-07T16:14:36Z Internet traffic analysis Gui, Shengyu Tan Yap Peng School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems This report presents two models that are used to detect the user abnormal behavior and network intrusion respectively. The user abnormal behavior detection model uses the pattern-matching techniques to identify the user. The intrusion detection model detects intrusion based on known intrusion patterns and normal Internet traffic parameters. The process of user abnormality detection is to first collect and analyze user input and internet traffic information, classify the user activities to specific types and build signatures database of each activity type. Then users are identified by those signatures after login. The signature consists of the user input signature and the internet traffic information. The intrusion detection model aims to detect intrusion based on normal internet traffic parameters and operational values. Since Denial-of-service is one of the intrusions that can be easily launched and pose great threat to network and workstations, therefore, the model focus on detecting DOS attack. TCP flood attack and ICMP flood attack are simulated for intrusion detection testing. The functionality of these two models is to provide a more secure working and network environment for individuals continuously. Bachelor of Engineering 2014-06-04T01:37:57Z 2014-06-04T01:37:57Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/60991 en Nanyang Technological University 66 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Gui, Shengyu
Internet traffic analysis
description This report presents two models that are used to detect the user abnormal behavior and network intrusion respectively. The user abnormal behavior detection model uses the pattern-matching techniques to identify the user. The intrusion detection model detects intrusion based on known intrusion patterns and normal Internet traffic parameters. The process of user abnormality detection is to first collect and analyze user input and internet traffic information, classify the user activities to specific types and build signatures database of each activity type. Then users are identified by those signatures after login. The signature consists of the user input signature and the internet traffic information. The intrusion detection model aims to detect intrusion based on normal internet traffic parameters and operational values. Since Denial-of-service is one of the intrusions that can be easily launched and pose great threat to network and workstations, therefore, the model focus on detecting DOS attack. TCP flood attack and ICMP flood attack are simulated for intrusion detection testing. The functionality of these two models is to provide a more secure working and network environment for individuals continuously.
author2 Tan Yap Peng
author_facet Tan Yap Peng
Gui, Shengyu
format Final Year Project
author Gui, Shengyu
author_sort Gui, Shengyu
title Internet traffic analysis
title_short Internet traffic analysis
title_full Internet traffic analysis
title_fullStr Internet traffic analysis
title_full_unstemmed Internet traffic analysis
title_sort internet traffic analysis
publishDate 2014
url http://hdl.handle.net/10356/60991
_version_ 1772826008980815872