Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/459163
Title: Study and analysis of network behaviour for anomaly detection
Researcher: Selvakumar B
Guide(s): Muneeswaran K
Keywords: Intrusion Detection System
Network Security
Anomaly Detection
University: Anna University
Completed Date: 2021
Abstract: The proposed work addresses the issues related to the network newlineintrusion and the mechanism to detect them. An intrusion is a set of sequence of newlineactions taken on a computer or network to affect the performance of the computer newlinein terms of its behavior in communication with the respect of the world. Intrusion newlinedetection is a set of tools and methods to distinguish illegal actions on the newlinecomputer system or network either available as software or hardware. An intrusion newlinedetection system (IDS) can detect various kinds of attacks in a network and host newlinecomputer. For detection, the system monitors network traffic in promiscuous newlinemode, and collects the traffic for the further analysis. Data that are collected from newlinevarious sources are analyzed and if malicious activity is detected, the intrusion newlinedetection system alerts the administrator and/or right stakeholders. The IDS is newlinebroadly classified into misuse detection, anomaly detection and the combination newlineof both. The detection can be done both at system and network level. The IDS can newlinebe deployed at one or more location as per the requirements. The Network IDS newline(NIDS) analyze the traffic in terms of where it emanates, destined to whom, size newlineof the traffic, duration of the session, what kind of applications, types of newlineconnection, header information. For any flow of traffic, it can be characterized by newlinewhether it is normal or abnormal. The statistical information about the traffic flow newlineis summarized as a record of data which is fed as input for the proposed NIDS. newlineAlready a set of benchmark data is made available in the form of dataset by the newlineresearchers in the network domain. newlineSome of the popular datasets are KDDCUP 99, NSL-KDD, newlineCICIDS2017, which we have chosen for our experimentation. Some of the attacks newlineencountered in the data flow includes Denial of Service Attack, User to Root newlineAttack, Remote to Local Attack, Probing or infiltration Attack, Brute Force newlineAttack, Heartbleed Attack, Distributed Denial of Service, and Web Attack. newline
Pagination: xxiii,150p.
URI: http://hdl.handle.net/10603/459163
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File39 kBAdobe PDFView/Open
02_prelim pages.pdf531.2 kBAdobe PDFView/Open
03_content.pdf16.33 kBAdobe PDFView/Open
04_abstract.pdf9.71 kBAdobe PDFView/Open
05_chapter 1.pdf554.45 kBAdobe PDFView/Open
06_chapter 2.pdf293.98 kBAdobe PDFView/Open
07_chapter 3.pdf636.93 kBAdobe PDFView/Open
08_chapter 4.pdf895.97 kBAdobe PDFView/Open
09_annexures.pdf134.72 kBAdobe PDFView/Open
80_recommendation.pdf66.32 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: