Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/208292
Title: | An Integrated Approach for Detection and Classification of Data Exfiltration Anomalies Based on Host Behaviours in Network Environment |
Researcher: | Rajamenakshi R |
Guide(s): | Padmavathi G |
Keywords: | Data Exfiltration Classification Detection Behavior based |
University: | Avinashilingam Deemed University For Women |
Completed Date: | 13-07-2018 |
Abstract: | Network security is an important area of research over many decades. Network attacks of the newlinerecent times are more dynamic in nature and leaves no trace of the attack. Zero day attacks and newlineAdvanced Persistent Threats (APT) attacks are multi-stage attacks of the present day leading to data newlineexfiltration. These attacks are targeted for various reasons leaving huge impact to the organization in newlineterms of incurring financial loss, loss of repudiation and loss of intellectual property. Current day newlineattacks exploit the gaps and inconsistencies in the existing system while performing these attacks. The newlinepresent day perimeter and the end-point security solutions are not designed to handle the current day newlineattacks. The cyber-crime reports show the substantial increase in the spending over the recent times newlineaffecting various industry sector. newlineAlthough there are data exfiltration anomaly detection methods that explore different attack newlineindicators for identifying anomalies, these methods do not converge or provide an integrated and a newlineconsolidated view of the data exfiltration anomalies that are present. Moreover, the data exfiltration newlineattacks are staged on the compromised host and hence any significant change in the behaviour of the newlinehost can indicate an attack. The anomaly detection approach based on the network and the system newlinebehaviour of the host along with the threats posed by the host is studied. Based on the challenges newlineposed by the data exfiltration attacks and the research gaps that exist, the objectives of this research newlinework are formulated after studying significant literatures. This research work is based on the detecting newlinethe data exfiltration attacks using network flows in an unencrypted data and over physical devices. newlineA five step methodology is proposed with four contributions to meet the objectives of the thesis. Data newlineexfiltration detection is proposed based on Host network behaviours that combines host network and newlinesystem behaviour based features. |
Pagination: | 147 p. |
URI: | http://hdl.handle.net/10603/208292 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01. title.pdf | Attached File | 303.39 kB | Adobe PDF | View/Open |
02. certificate.pdf | 566.44 kB | Adobe PDF | View/Open | |
03. acknowledgement.pdf | 209.9 kB | Adobe PDF | View/Open | |
04. contents.pdf | 404.86 kB | Adobe PDF | View/Open | |
05. list of tables, figures & acronyms.pdf | 817.14 kB | Adobe PDF | View/Open | |
06. chapter1.pdf | 855.75 kB | Adobe PDF | View/Open | |
07. chapter2.pdf | 636.94 kB | Adobe PDF | View/Open | |
08. chpater3.pdf | 566.83 kB | Adobe PDF | View/Open | |
09. chapter4.pdf | 1.45 MB | Adobe PDF | View/Open | |
10. chapter5.pdf | 1.38 MB | Adobe PDF | View/Open | |
11. chapter6.pdf | 1.07 MB | Adobe PDF | View/Open | |
12. chapter7.pdf | 1.27 MB | Adobe PDF | View/Open | |
13. chapter8.pdf | 616.5 kB | Adobe PDF | View/Open | |
14. .references.pdf | 609.68 kB | Adobe PDF | View/Open | |
15. annexures.pdf | 1.34 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: