Detekcija napada u računarskim mrežama zasnovana na analizi strukture saobraćaja primenom kombinovanih algoritama mašinskog učenja
Network attacks detection based on traffic flows analysis using hybrid machine learning algorithms
dc.contributor.advisor | Gajin, Slavko | |
dc.contributor.other | Milićev, Dragan | |
dc.contributor.other | Vuletić, Pavle | |
dc.contributor.other | Marić, Miroslav | |
dc.contributor.other | Stanisavljević, Žarko | |
dc.creator | Timčenko, Valentina | |
dc.date.accessioned | 2023-05-18T12:54:24Z | |
dc.date.available | 2023-05-18T12:54:24Z | |
dc.date.issued | 2022-07-05 | |
dc.identifier.uri | https://eteze.bg.ac.rs/application/showtheses?thesesId=9087 | |
dc.identifier.uri | https://fedorabg.bg.ac.rs/fedora/get/o:29326/bdef:Content/download | |
dc.identifier.uri | https://plus.cobiss.net/cobiss/sr/sr/bib/115324681 | |
dc.identifier.uri | https://nardus.mpn.gov.rs/handle/123456789/21403 | |
dc.description.abstract | Razvoj savremenih mrežnih okruženja se zasniva na primeni različitih tehnologija, povezivanju sa drugim tehnološki drugačijim konceptima i obezbeđivanju njihove interoperabilnosti. Tako složeno mrežno okruženje je neprekidno izloženo različitim izazovima, pri čemu je obezbeđivanje sigurnosti servisa i podataka jedan od najvažnijih zadataka. Novi zahtevi za sisteme zaštite se zasnivaju na potrebi za efikasnim praćenjem i razumevanju karakteristika mrežnog saobraćaja, a uslovljeni su stalnim porastom broja korisnika i razvojem novih aplikacija. Razvoj rešenja u oblasti detekcije anomalija i napada je postao svojevrsni imperativ, imajući u vidu da se paralelno odvija intenzivni razvoj u oblasti sajber napada. Osim toga, promene mrežnog saobraćaja su postale sve dinamičnije, a kao poseban problem se izdvaja velika heterogenost primenjenih tehnologija i korisničkih uređaja. Iako dostupna literatura prepoznaje veliki broj radova koji se bave analizom tokova mrežnog saobraćaja za potrebe praćenja performansi i sigurnosnih aspekata mreža, mali je broj istraživanja koja se zasnivaju na procedurama generisanja i analize profila ponašanja mrežnog saobraćaja, odnosno specifičnih komunikacionih obrazaca. U tom smislu, analiza ponašanja mreže se u sve većoj meri oslanja na razumevanje normalnih ili prihvatljivih obrazaca ponašanja na osnovu kojih je moguće efikasno otkrivanje obrazaca anomalija. Za razliku od sistema za otkrivanje napada koji se zasnivaju na analizi sadržaja svakog pojedinačnog paketa (signature-based), ovaj pristup je izuzetno koristan za identifikaciju nepoznatih pretnji, napada nultog dana, sumnjivog ponašanja i za sveopšte poboljšavanje performansi mrežnih okruženja... | sr |
dc.description.abstract | The development of the modern network environments, their application, and the dynamics of their interoperability with other technologically different concepts, is based on the application and compatibility of different heterogeneous technologies. Such a complex network environment is constantly exposed to various operational challenges, where ensuring the security and safety of services and data represents one of the most important tasks. The constant increase in the number of users and the intensive development of new applications that require high bandwidth has defined new requirements for security systems, which are based on monitoring and effectively understanding network traffic characteristics. In the light of the increasingly intensive development in the field of cyberattacks, persistent dynamic changes in network traffic, as well as the increased heterogeneity of the used technologies and devices, the development of solutions in the field of anomaly and attack detection has become a kind of imperative. Although the available literature recognizes a large number of papers dealing with the analysis of network traffic flows for the needs of the monitoring of the performance and security aspects of networks, just a few studies are based on the procedures for generating network traffic behavior profiles, or specific communication patterns. In this sense, network behavior analysis relies on an understanding of normal or acceptable behavior patterns, which would allow for the effective detection of unusual, anomalous behavior patterns. Unlike the intrusion detection systems that are based on the packet payload or signature (signature-based), this approach is extremely useful not only for the identification of unknown threats, zero-day attacks, and suspicious behavior, but also for the improvement of the overall network performance... | en |
dc.format | application/pdf | |
dc.language | sr | |
dc.publisher | Универзитет у Београду, Електротехнички факултет | sr |
dc.rights | openAccess | en |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.source | Универзитет у Београду | sr |
dc.subject | detekcija anomalija i napada | sr |
dc.subject | Anomaly and Attack Detection | en |
dc.subject | algoritmi klasterovanja | sr |
dc.subject | entropija | sr |
dc.subject | mašinsko učenje | sr |
dc.subject | Clustering Algorithms | en |
dc.subject | Entropy | en |
dc.subject | Machine learning | en |
dc.title | Detekcija napada u računarskim mrežama zasnovana na analizi strukture saobraćaja primenom kombinovanih algoritama mašinskog učenja | sr |
dc.title.alternative | Network attacks detection based on traffic flows analysis using hybrid machine learning algorithms | en |
dc.type | doctoralThesis | |
dc.rights.license | BY | |
dc.identifier.fulltext | http://nardus.mpn.gov.rs/bitstream/id/150850/Disertacija_13527.pdf | |
dc.identifier.fulltext | http://nardus.mpn.gov.rs/bitstream/id/152728/Referat.pdf | |
dc.identifier.rcub | https://hdl.handle.net/21.15107/rcub_nardus_21403 |