Machine learning based cybersecurity analytics

Information or data leakage can be intentional or unintentional. Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber...

Full description

Saved in:
Bibliographic Details
Main Author: Tang, Yan Shuo
Other Authors: Sinha Sharad
Format: Final Year Project
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/74067
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-74067
record_format dspace
spelling sg-ntu-dr.10356-740672023-03-03T20:45:41Z Machine learning based cybersecurity analytics Tang, Yan Shuo Sinha Sharad School of Computer Science and Engineering Custodio Technologies Pte Ltd DRNTU::Engineering::Computer science and engineering Information or data leakage can be intentional or unintentional. Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber hygiene during transfer of information out of the organization without noticing associated risks. In the Final Year Report (FYP) described in this report, the focus is on monitoring NetFlow traffic within an organization, detecting if there is any abnormal data transfer to external entities from within the organization. NetFlow is a network protocol developed by Cisco for recording IP traffic information and network data performance. Most of the important information in packet are used to form NetFlow to act as an enhancement for packets. Machine Learning (Ensemble Method – XGBoost) is created for detecting such data exfiltration. When data exfiltration is detected using the proposed model, all the traffic from the source IP address within the day is output into a file for close monitoring by related personnel in an organization. Bachelor of Engineering (Computer Science) 2018-04-24T04:56:36Z 2018-04-24T04:56:36Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74067 en Nanyang Technological University 34 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Tang, Yan Shuo
Machine learning based cybersecurity analytics
description Information or data leakage can be intentional or unintentional. Disgruntled employees, honey-trapped employees, “cash-for-data” greedy employees and similar categories of employees can deliberately transfer information out of the organization while many regular employees may not practice good cyber hygiene during transfer of information out of the organization without noticing associated risks. In the Final Year Report (FYP) described in this report, the focus is on monitoring NetFlow traffic within an organization, detecting if there is any abnormal data transfer to external entities from within the organization. NetFlow is a network protocol developed by Cisco for recording IP traffic information and network data performance. Most of the important information in packet are used to form NetFlow to act as an enhancement for packets. Machine Learning (Ensemble Method – XGBoost) is created for detecting such data exfiltration. When data exfiltration is detected using the proposed model, all the traffic from the source IP address within the day is output into a file for close monitoring by related personnel in an organization.
author2 Sinha Sharad
author_facet Sinha Sharad
Tang, Yan Shuo
format Final Year Project
author Tang, Yan Shuo
author_sort Tang, Yan Shuo
title Machine learning based cybersecurity analytics
title_short Machine learning based cybersecurity analytics
title_full Machine learning based cybersecurity analytics
title_fullStr Machine learning based cybersecurity analytics
title_full_unstemmed Machine learning based cybersecurity analytics
title_sort machine learning based cybersecurity analytics
publishDate 2018
url http://hdl.handle.net/10356/74067
_version_ 1759858414834417664