Return to search

MACHINE LEARNING BASED IDS LOG ANALYSIS

<p>With the rapid development of information technology, network traffic is also increasing dramatically. However, many cyber-attack records are buried in this large amount of network trafficking. Therefore, many Intrusion Detection Systems (IDS) that can extract those malicious activities have been developed. Zeek is one of them, and due to its powerful functions and open-source environment, Zeek has been adapted by many organizations. Information Technology at Purdue (ITaP), which uses Zeek as their IDS, captures netflow logs for all the network activities in the whole campus area but has not delved into effective use of the information. This thesis examines ways to help increase the performance of anomaly detection. As a result, this project intends to combine basic database concepts with several different machine learning algorithms and compare the result from different combinations to better find potential attack activities in log files.</p>

  1. 10.25394/pgs.14495400.v1
Identiferoai:union.ndltd.org:purdue.edu/oai:figshare.com:article/14495400
Date06 May 2021
CreatorsTianshuai Guan (10710258)
Source SetsPurdue University
Detected LanguageEnglish
TypeText, Thesis
RightsCC BY 4.0
Relationhttps://figshare.com/articles/thesis/MACHINE_LEARNING_BASED_IDS_LOG_ANALYSIS/14495400

Page generated in 0.0019 seconds