Приказ основних података о дисертацији

Arhitektura sistema za prepoznavanje nepravilnosti u mrežnom saobraćaju zasnovano na analizi entropije

dc.contributor.advisorGajin, Slavko
dc.contributor.otherTomašević, Milo
dc.contributor.otherMarić, Miroslav
dc.creatorIbrahim, Juma
dc.date.accessioned2023-09-06T10:59:43Z
dc.date.available2023-09-06T10:59:43Z
dc.date.issued2022-12-15
dc.identifier.urihttps://uvidok.rcub.bg.ac.rs/bitstream/handle/123456789/4944/Referat.pdf
dc.identifier.urihttps://eteze.bg.ac.rs/application/showtheses?thesesId=9220
dc.identifier.urihttps://fedorabg.bg.ac.rs/fedora/get/o:30651/bdef:Content/download
dc.identifier.urihttps://plus.cobiss.net/cobiss/sr/sr/bib/121527049
dc.identifier.urihttps://nardus.mpn.gov.rs/handle/123456789/21555
dc.description.abstractWith the steady increase in reliance on computer networks in all aspects of life, computers and other connected devices have become more vulnerable to attacks, which exposes them to many major threats, especially in recent years. There are different systems to protect networks from these threats such as firewalls, antivirus programs, and data encryption, but it is still hard to provide complete protection for networks and their systems from the attacks, which are increasingly sophisticated with time. That is why it is required to use intrusion detection systems (IDS) on a large scale to be the second line of defense for computer and network systems along with other network security techniques. The main objective of intrusion detection systems is used to monitor network traffic and detect internal and external attacks. Intrusion detection systems represent an important focus of studies today, because most protection systems, no matter how good they are, can fail due to the emergence of new (unknown/predefined) types of intrusions. Most of the existing techniques detect network intrusions by collecting information about known types of attacks, so-called signature-based IDS, using them to recognize any attempt of attack on data or resources. The major problem of this approach is its inability to detect previously unknown attacks, even if these attacks are derived slightly from the known ones (the so-called zero-day attack). Also, it is powerless to detect encryption-related attacks. On the other hand, detecting abnormalities concerning conventional behavior (anomaly-based IDS) exceeds the abovementioned limitations. Many scientific studies have tended to build modern and smart systems to detect both known and unknown intrusions. In this research, an architecture that applies a new technique for IDS using an anomaly-based detection method based on entropy is introduced. Network behavior analysis relies on the profiling of legitimate network behavior in order to efficiently detect anomalous traffic deviations that indicate security threats. Entropy-based detection techniques are attractive due to their simplicity and applicability in real-time network traffic, with no need to train the system with labelled data. Besides the fact that the NetFlow protocol provides only a basic set of information about network communications, it is very beneficial for identifying zero-day attacks and suspicious behavior in traffic structure. Nevertheless, the challenge associated with limited NetFlow information combined with the simplicity of the entropy-based approach is providing an efficient and sensitive mechanism to detect a wide range of anomalies, including those of small intensity. However, a recent study found of generic entropy-based anomaly detection reports its vulnerability to deceit by introducing spoofed data to mask the abnormality. Furthermore, the majority of approaches for further classification of anomalies rely on machine learning, which brings additional complexity. Previously highlighted shortcomings and limitations of these approaches open up a space for the exploration of new techniques and methodologies for the detection of anomalies in network traffic in order to isolate security threats, which will be the main subject of the research in this thesis. Abstract An architrvture for network traffic anomaly detection system based on entropy analysis Page vii This research addresses all these issues by providing a systematic methodology with the main novelty in anomaly detection and classification based on the entropy of flow count and behavior features extracted from the basic data obtained by the NetFlow protocol. Two new approaches are proposed to solve these concerns. Firstly, an effective protection mechanism against entropy deception derived from the study of changes in several entropy types, such as Shannon, Rényi, and Tsallis entropies, as well as the measurement of the number of distinct elements in a feature distribution as a new detection metric. The suggested method improves the reliability of entropy approaches. Secondly, an anomaly classification technique was introduced to the existing entropy-based anomaly detection system. Entropy-based anomaly classification methods were presented and effectively confirmed by tests based on a multivariate analysis of the entropy changes of several features as well as aggregation by complicated feature combinations. Through an analysis of the most prominent security attacks, generalized network traffic behavior models were developed to describe various communication patterns. Based on a multivariate analysis of the entropy changes by anomalies in each of the modelled classes, anomaly classification rules were proposed and verified through the experiments. The concept of the behavior features is generalized, while the proposed data partitioning provides greater efficiency in real-time anomaly detection. The practicality of the proposed architecture for the implementation of effective anomaly detection and classification system in a general real-world network environment is demonstrated using experimental data.sr
dc.formatapplication/pdf
dc.languageen
dc.publisherУниверзитет у Београду, Електротехнички факултетsr
dc.rightsopenAccessen
dc.sourceУниверзитет у Београдуsr
dc.subjectAnomaly detectionsr
dc.subjectAnomaly classificationsr
dc.subjectEntropysr
dc.subjectEntropy deceptionsr
dc.subjectNetwork behavior analysissr
dc.titleAn architecture for network traffic anomaly detection system based on entropy analysissr
dc.title.alternativeArhitektura sistema za prepoznavanje nepravilnosti u mrežnom saobraćaju zasnovano na analizi entropijeen
dc.typedoctoralThesis
dc.rights.licenseARR
dc.identifier.fulltexthttp://nardus.mpn.gov.rs/bitstream/id/151583/Disertacija_13681.pdf
dc.identifier.fulltexthttp://nardus.mpn.gov.rs/bitstream/id/152486/Referat.pdf
dc.identifier.rcubhttps://hdl.handle.net/21.15107/rcub_nardus_21555


Документи за докторску дисертацију

Thumbnail
Thumbnail

Ова дисертација се појављује у следећим колекцијама

Приказ основних података о дисертацији