Applications of artificial intelligence in cyber security

Assignment Help Other Engineering
Reference no: EM133148276

COMP8325 Applications of Artificial Intelligence for Cyber Security - Macquarie University

Assignment - Description

Learning Outcome 1: Explain the basic concepts and the limitations of Artificial Intelligence;
Detect intrusion in networks and systems by applying tools and techniques revealing abnormal patterns in datasets; and

Learning Outcome 2: Analyse the trends of applications of Artificial Intelligence in cyber security.

TASK 1: Merits of Entropy in Attack Detection/Diagnostics

Consider a server-log dataset hosted at Google Drive. Two attacks happened on a day, both somewhere around 8am and noon. Please answer the following questions:

- Identify the exact date and time1. What approach did the attackers use?

There has been significant literature23 discussing how entropy can be used to detect these attacks. To do it effectively, approximation schemes are usually used. You do not have to implement these approximation techniques, but do present an analysis of whether entropy is useful and which com- binations you tried, e.g. src ip, dest ip, src-port, dst-port, etc. Do any reveal anomalies when the two attacks happen?

TASK 2: Web Tracking

A typical webpage consists of several web-components, e.g., JavaScript codes, Flash-content, images, CSS, etc. When a user opens a website in a web browser, the fetched webpage typically generates several other HTTP(S) connections for downloading additional components of the webpage. These components can be downloaded from the website visited by the user (referred to as first-party domain) or downloaded from other third-party domains. Here, we focus on one type of web-component, namely JavaScript codes, which is loaded both from first- and third-party domains. JavaScript programs are widely used by ad networks, content distribution networks (CDNs), tracking services, analytics platforms, and online social networks (e.g., Facebook uses them to implement plugins)

Figure1illustrates a typical scenario of web tracking via JavaScript codes. Upon fetching a webpage from first-party domains (steps 1 & 2), the user's web browser interprets the HTML tags and executes JavaScript programs within the HTML script tags. JavaScript code execution enables the web browser to send requests to retrieve additional content from third-party domains (step 3). Depending on the implemented function- alities, the JavaScript programs can be considered as useful (functional), e.g., fetching content from a CDN, or as tracking. In the latter case, when the webpage is completely rendered (step 4), the JavaScript codes track user's activities on the webpage, write to or read from the cookie database (steps 5 & 6), or reconstruct user identifiers. Tracking JavaScript programs may also be used to fingerprint user's browser (as well as system) and to transfer private and sensitive information to third-party domains (step 7).

Now, imagine your are given a task to develop a machine-learning based on only class(i.e., One Class SVM or Positive Unlabelled (PU) Learning, see ref4) technique to differentiate tracking JavaScript codes from functional ones. To this end you are provided with labelled dataset (see COMP8325's iLearn page) containing labelled functional and tracking JavaScript codes. Here may use the code provided at iLearn to do the following tasks.

Use Term Frequency - Inverse Document Frequency (TF-IDF) to extract features from functional and tracking JavaScript codes.

Develop either One-Class SVM or PU Learning, and a baseline SVM for comparison, to classify the JavaScript codes.
Design and conduct experiments to validate and test the efficacy of your developed model:
- To report any over- or under-fitting of the models, you may use 60% of the data for testing, 20% for validation, and 20% for the testing.
- Report and discuss the parameters of OCSVM or PU Learning model which give your improved results.

Attachment:- Artificial Intelligence for Cyber Security.rar

Reference no: EM133148276

Questions Cloud

Examples of preventive ltc services : What are some examples of preventive LTC services? What services does your chosen LTC organization offer? Do you think it is sufficient?
Prepare necessary journal entries for the entire lease term : The lease provides for a transfer of title to the lessee at the end of the lease term. Prepare necessary journal entries for the entire lease term
Sense in an office or industrial lease : Why would percentage rent provisions make less sense in an office or industrial lease?
Incorporating the smart principles and strategies : To create a professional development plan around one specific goal, incorporating the SMART principles and strategies learned in class
Applications of artificial intelligence in cyber security : Analyse the trends of applications of Artificial Intelligence in cyber security and Identify the exact date and time. What approach did the attackers use?
Addressing the healthcare labor shortage : What alternatives to loan forgiveness are there for addressing the healthcare labor shortage?
Reviewing strategic approaches : Select a company and review which one of these strategic approaches (focus on differentiation, become a cost leader, or create a blue ocean and make competition
Compute for the lease liability and right-of-use asset : The company has guaranteed a P200,000 residual value on December 31, 2022. Compute for the lease liability and right-of-use asset
Describe the leaders in the organization : Think about an organization with which you are familiar, one you work or have worked for or volunteered with or one someone you know has worked or volunteered w

Reviews

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd