Investigation on effective solutions against insider attacks (B)
Insider Attacks (IAs) can be defined as an attack or intrusion that is performed from the internal boundaries of the network. While Intrusion Detection Systems (IDS) devices are placed strategically in the network to detect external intrusions, the same cannot be said for internal intrusions like IA...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/77389 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-77389 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-773892023-07-07T16:06:58Z Investigation on effective solutions against insider attacks (B) Alhammi Aliff Rosli Ma Maode School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Insider Attacks (IAs) can be defined as an attack or intrusion that is performed from the internal boundaries of the network. While Intrusion Detection Systems (IDS) devices are placed strategically in the network to detect external intrusions, the same cannot be said for internal intrusions like IAs. Furthermore, existing IDS technologies have proven to be lacking in detecting obscure attacks like IAs. This project investigates the implementation of several ML-based classification algorithms into the proposed IDS, specifically, Support Vector Machine (SVM), Extreme Learning Machine (ELM) and Multi-layer Perceptron (MLP). The performance of the classifiers were analyzed and compared against one another as a means to find the best ML classifier for IDS against IAs and EAs. A Python-based program was created for this project to verify the IDS detection and classification performance of EAs and IAs using two modified datasets, IAs Dataset and EA Dataset, deriving from NSL-KDD dataset. Five experimental trials were conducted, and it was discovered that the ML classifiers exemplified robust performance, with MLP yielding the most effective detection performance, and SVM and ELM yielding strong efficiency performance. Bachelor of Engineering (Information Engineering and Media) 2019-05-28T03:12:47Z 2019-05-28T03:12:47Z 2019 Final Year Project (FYP) http://hdl.handle.net/10356/77389 en Nanyang Technological University 103 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Alhammi Aliff Rosli Investigation on effective solutions against insider attacks (B) |
description |
Insider Attacks (IAs) can be defined as an attack or intrusion that is performed from the internal boundaries of the network. While Intrusion Detection Systems (IDS) devices are placed strategically in the network to detect external intrusions, the same cannot be said for internal intrusions like IAs. Furthermore, existing IDS technologies have proven to be lacking in detecting obscure attacks like IAs. This project investigates the implementation of several ML-based classification algorithms into the proposed IDS, specifically, Support Vector Machine (SVM), Extreme Learning Machine (ELM) and Multi-layer Perceptron (MLP). The performance of the classifiers were analyzed and compared against one another as a means to find the best ML classifier for IDS against IAs and EAs. A Python-based program was created for this project to verify the IDS detection and classification performance of EAs and IAs using two modified datasets, IAs Dataset and EA Dataset, deriving from NSL-KDD dataset. Five experimental trials were conducted, and it was discovered that the ML classifiers exemplified robust performance, with MLP yielding the most effective detection performance, and SVM and ELM yielding strong efficiency performance. |
author2 |
Ma Maode |
author_facet |
Ma Maode Alhammi Aliff Rosli |
format |
Final Year Project |
author |
Alhammi Aliff Rosli |
author_sort |
Alhammi Aliff Rosli |
title |
Investigation on effective solutions against insider attacks (B) |
title_short |
Investigation on effective solutions against insider attacks (B) |
title_full |
Investigation on effective solutions against insider attacks (B) |
title_fullStr |
Investigation on effective solutions against insider attacks (B) |
title_full_unstemmed |
Investigation on effective solutions against insider attacks (B) |
title_sort |
investigation on effective solutions against insider attacks (b) |
publishDate |
2019 |
url |
http://hdl.handle.net/10356/77389 |
_version_ |
1772826814251532288 |