Font Size: a A A

A data extraction approach using vector representation of timestamps to determine network traffic pattern

Posted on:2006-08-08Degree:M.SType:Thesis
University:State University of New York Institute of TechnologyCandidate:Khare, RohitFull Text:PDF
GTID:2458390008956660Subject:Computer Science
Abstract/Summary:
Network based intrusions have become a serious threat to today's highly networked information systems, requiring researchers to develop methods to detect attacks on the network. Two approaches that are used for analyzing whether there is any intrusion or attacks in a network are passive and active. The passive approach is a defensive mechanism which uses encryption, network security, firewalls and intrusion sensors built into Intrusion Detection Systems (IDSs). Whereas an active approach, such as data mining techniques, gives the network administrator the means to accurately track, monitor and detect an attacker. In this research, an active approach, using data extraction techniques, is used to analyze network activity.; The approach implemented in this research is based on statistical mathematical tools and any prior knowledge of the data being gathered to detect an attack on the network. This approach also uses visualization techniques such as graphs and plots to analyze the network events. (Abstract shortened by UMI.)...
Keywords/Search Tags:Network, Approach, Data
Related items