Anomaly Detection Using Network Traffic Characterization

dc.contributor.advisor Tuğlular, Tuğkan
dc.contributor.author Yarımtepe, Oğuz
dc.contributor.author Tuğlular, Tuğkan
dc.date.accessioned 2014-07-22T13:51:34Z
dc.date.available 2014-07-22T13:51:34Z
dc.date.issued 2009
dc.description Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2009 en_US
dc.description Includes bibliographical references (leaves: 63-66) en_US
dc.description Text in English Abstract: Turkish and English en_US
dc.description ix, 80 leaves en_US
dc.description.abstract Detecting suspicious traffic and anomaly sources are a general tendency about approaching the traffic analyzing. Since the necessity of detecting anomalies, different approaches are developed with their software candidates. Either event based or signature based anomaly detection mechanism can be applied to analyze network traffic. Signature based approaches require the detected signatures of the past anomalies though event based approaches propose a more flexible approach that is defining application level abnormal anomalies is possible. Both approach focus on the implementing and defining abnormal traffic. The problem about anomaly is that there is not a common definition of anomaly for all protocols or malicious attacks. In this thesis it is aimed to define the non-malicious traffic and extract it, so that the rest is marked as suspicious traffic for further traffic. To achieve this approach, a method and its software application to identify IP sessions, based on statistical metrics of the packet flows are presented. An adaptive network flow knowledge-base is derived. The knowledge-base is constructed using calculated flows attributes. A method to define known traffic is displayed by using the derived flow attributes. By using the attributes, analyzed flow is categorized as a known application level protocol. It is also explained a mathematical model to analyze the undefined traffic to display network traffic anomalies. The mathematical model is based on principle component analysis which is applied on the origindestination pair flows. By using metric based traffic characterization and principle component analysis it is observed that network traffic can be analyzed and some anomalies can be detected. en_US
dc.identifier.uri https://hdl.handle.net/11147/3459
dc.language.iso en en_US
dc.publisher Izmir Institute of Technology en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject.lcc QA76.9.A25 .Y28 2009 en
dc.subject.lcsh Computer security en
dc.subject.lcsh Anomaly detection (Computer security) en
dc.title Anomaly Detection Using Network Traffic Characterization en_US
dc.type Master Thesis en_US
dspace.entity.type Publication
gdc.author.institutional Yarımtepe, Oğuz
gdc.author.yokid 144185
gdc.coar.access open access
gdc.coar.type text::thesis::master thesis
gdc.description.department Thesis (Master)--İzmir Institute of Technology, Computer Engineering en_US
gdc.description.publicationcategory Tez en_US
relation.isAuthorOfPublication.latestForDiscovery 7f52fb71-3121-46a6-a461-2ff1b28d9fa1
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4014-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
T000819.pdf
Size:
992.83 KB
Format:
Adobe Portable Document Format
Description:
MasterThesis

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: