Machine learning based cybersecurity analytics
Information or data leakage can be intentional or unintentional. Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74067 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-74067 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-740672023-03-03T20:45:41Z Machine learning based cybersecurity analytics Tang, Yan Shuo Sinha Sharad School of Computer Science and Engineering Custodio Technologies Pte Ltd DRNTU::Engineering::Computer science and engineering Information or data leakage can be intentional or unintentional. Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber hygiene during transfer of information out of the organization without noticing associated risks. In the Final Year Report (FYP) described in this report, the focus is on monitoring NetFlow traffic within an organization, detecting if there is any abnormal data transfer to external entities from within the organization. NetFlow is a network protocol developed by Cisco for recording IP traffic information and network data performance. Most of the important information in packet are used to form NetFlow to act as an enhancement for packets. Machine Learning (Ensemble Method – XGBoost) is created for detecting such data exfiltration. When data exfiltration is detected using the proposed model, all the traffic from the source IP address within the day is output into a file for close monitoring by related personnel in an organization. Bachelor of Engineering (Computer Science) 2018-04-24T04:56:36Z 2018-04-24T04:56:36Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74067 en Nanyang Technological University 34 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Tang, Yan Shuo Machine learning based cybersecurity analytics |
description |
Information or data leakage can be intentional or unintentional. Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber hygiene during transfer of information out of the organization without noticing associated risks. In the Final Year Report (FYP) described in this report, the focus is on monitoring NetFlow traffic within an organization, detecting if there is any abnormal data transfer to external entities from within the organization. NetFlow is a network protocol developed by Cisco for recording IP traffic information and network data performance. Most of the important information in packet are used to form NetFlow to act as an enhancement for packets. Machine Learning (Ensemble Method – XGBoost) is created for detecting such data exfiltration. When data exfiltration is detected using the proposed model, all the traffic from the source IP address within the day is output into a file for close monitoring by related personnel in an organization. |
author2 |
Sinha Sharad |
author_facet |
Sinha Sharad Tang, Yan Shuo |
format |
Final Year Project |
author |
Tang, Yan Shuo |
author_sort |
Tang, Yan Shuo |
title |
Machine learning based cybersecurity analytics |
title_short |
Machine learning based cybersecurity analytics |
title_full |
Machine learning based cybersecurity analytics |
title_fullStr |
Machine learning based cybersecurity analytics |
title_full_unstemmed |
Machine learning based cybersecurity analytics |
title_sort |
machine learning based cybersecurity analytics |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/74067 |
_version_ |
1759858414834417664 |