Create training and testing data samples

Assignment Help Computer Networking
Reference no: EM132224466

Data analytics for intrusion detection

Learning Outcomes

a) Evaluate intelligent security solutions based on data analytics
b) Analyse and interpret results from descriptive and predictive data analysis

Assignment Overview

You are hired by the Purehacking Pty Ltd (a popular penetration testing company in Australia) to consult an accounting company which requested advanced instruction detection system for their internal network. The accounting firm had suffered malicious hacking attack which compromised their client's information and released it on the dark web. The reputation of the accounting company was severely damaged, and the managing director of the accounting firm was determined not to tolerate any such future attacks that can jeopardize his business.

Your supervisor at Purehacking wishes to try out an advanced data analytic tool to improve the network instruction detection at the accounting company.

Your supervisor has asked you to test out a few data analytics techniques available on the market and evaluate their performance in network intrusion detection.

To provide a fair comparison of security performance, your supervisor is recommending you consider a network security benchmark data such as the popular KDD99 dataset.

Your supervisor will make recommendation to the accounting firm based on your technical findings and report.

Your tasks are to:

1. Perform intrusion detection using the available data analytics techniques using WEKA or other platforms.

2. Evaluate the performance of data analytic techniques in intrusion detection using comparative analysis

3. Recommend the security solution using the selected data analytic technique.

In consultation with your lecturer, you are to choose at least three data analytic techniques for network intrusion detection and prepare a technical research report. Follow the marking guide to prepare your report.

Section 1: Data Analytic Tools and Techniques

In this section, your task is to complete and write a report on the following:

1. Install/deploy the data analytic platform of your choice (on Win8 VM on VirtualBox).

2. Demonstrate the use of at least two data analytic techniques (e.g. decision tree, clustering or other techniques) - you are free to use any sample testing data to demonstrate your skills and knowledge.

3. Lab demonstration: Must explain how each tool technique works in your lab prior to week 11. Data can be anything including Iris data set.

Section 2: Data Analytic for Network Intrusion Detection

You are to perform the following tasks and write a full report on your outcomes:

1. Convert the benchmark data suitable for the data analytic tools and platform of your choice. Explain the differences in the available data format for data analytics.

2. Select the features with rationale (external reference or your own reasoning).

3. Create training and testing data samples

4. Evaluate and select the data analytic techniques for testing

5. Classify the network intrusion given the sample data

6. Evaluate the performance of intrusion detection using the available tools and technologies (e.g. confusion matrix).

7. Identify the limitation of overfitting

8. Evaluate and analyse the use of ensemble tools

9. Recommend the data analytic solution for the network intrusion detection.

10. Discuss future research work given time and resources

Verified Expert

In this assignment we have studied for about forensic dataset using weka tool.Here we have upload the dataset in the weka tool.Here we have applied different classifier and write a report on the intrusion detection using weka tool.

Reference no: EM132224466

Questions Cloud

Rules possess the so-called wagner-whitin property : Which of the following lot-sizing rules possess the so-called Wagner-Whitin property?
Original works of authorship including literary : “is a form of protection provided by the laws of the United States for ‘original works of authorship’ including literary, dramatic, musical,
Determine the company predetermined overhead rate : Using Coffee Bean Inc.'s current product costing system: Determine the company's predetermined overhead rate
Receive constructive criticism in working relationships : Explain ways to give and receive constructive criticism in working relationships.
Create training and testing data samples : MN623 Cybersecurity and Analytics - Melbourne institute of technology - Data analytics for intrusion detection - Evaluate intelligent security solutions
Seven operational competitive dimensions : Describe a specific example of the trade-offs between any two of the seven operational competitive dimensions?
Which of these challenges do you think is most pressing : Which of these challenges do you think is the most pressing and significant? What other challenges do you think face the United States today?
Calculating cost-volume analysis : What are the primary assumptions that must be met when calculating cost-volume analysis?
Competing cultures merge into one that works together : What suggestions might you make to have competing cultures merge into one that works together effectively?

Reviews

len2224466

1/29/2019 9:37:53 PM

Explanation All elements are present and well integrated. Components present with good cohesion Components present and mostly well integrated Most components present Lacks structure. Reference style Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors Report structure and report presentation Proper writing. Professionally presented Properly written, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation

len2224466

1/29/2019 9:37:46 PM

Marking Rubrics Marking Rubric for Assignment #2: Total Marks 80 Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail < 50% Excellent Very Good Good Satisfactory Unsatisfactory Evaluation Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent and convincing Adequate cohesion and conviction Argument is confused and disjointed Implementation All elements are present and very well Implemented. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.

len2224466

1/29/2019 9:37:35 PM

Report structure and report presentation Compile a written report of the above along with your evaluations and recommendations. The report must contain several screenshots of evidence and a short description for each snapshot that provides proof that you completed the work. 10 Reference style Follow IEEE reference style 2 Section 2 – Data analytics 1. Convert the benchmark data suitable for the data analytic tools and platform of your choice. Explain the differences in the available data format for data analytics. 2. Select the features with rationale (external reference or your own reasoning). 3. Create training and testing data samples 4. Evaluate and select the data analytic techniques for testing 5. Classify the network intrusion given the sample data 6. Evaluate the performance of intrusion detection using the available tools and technologies (e.g. confusion matrix). 7. Identify the limitation of overfitting 8. Evaluate and analyse the use of ensemble tools 9. Recommend the data analytic solution for the network intrusion detection. 10. Discuss future research work given time and resources 5 practical report

len2224466

1/29/2019 9:37:10 PM

Marking criteria: Section to be included in the report and demonstration Description of the section Marks Section 1 - Install and deploy Introduction to each of your data analytic tools and platforms 3 Section 1- Explain and evaluate Full explanation of each data analytic techniques with support from either own evidence(s) and/or from other online sources. Advantages and disadvantages of each data analytic techniques (of your choice). 5 Section 1 - Lab demonstration To obtain full marks, students need to implement and demonstrate the use of at least two data analytic techniques in any platform of your choice. You may choose to use any testing data for demonstration. 10

len2224466

1/29/2019 9:36:56 PM

Word limit 1200-1500 words Due Date Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Compare two tools for one of three network management areas

Compare and contrast two tools for one of the three network management areas. What is the best tool for each area?

  Identify three current or future security issues in sdn

MN502 - Overview of Network Security Literature review on Software Defined Networking (SDN) and Identify three current or future security issues in SDN.

  Prepare a design for a state of the art network

To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading. Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals. Provide a ..

  Develop application - a connection oriented

In this project, you will develop two applications: a connection oriented (TCP) IM (Instant message) server and a client

  Kind of networking hardware used-dsl for internet connection

Most homeowners select to install a DSL for Internet connection what kind of networking hardware would you suggest?

  Question you work the night shift at a software development

question you work the night shift at a software development company and mange six web servers that host the

  Devise an assessment plan of the applications for network

Categorise applications identified by users and devise an assessment plan of the applications for network performance - Evaluate performance metrics

  Benefits of use-case modeling

Benefits of Use-Case Modeling. Use case modeling is popular and offers many benefits. Please respond to the following:

  Compare features cost and feedback from reviewers

Research Antivirus Software For Windows machines, the built-in Windows Defender is considered to be a fairly decent solution for home users.

  How to install dns and configure it including dns tree

How to install DNS and configure it including DNS tree. Explain ongoing monitoring and management of server installation. Recommendations for utilizing Hyper-V.

  Which is the minimum water temperature of a dolphin of 2

thermal analysis of aquatic mammal such as a dolphin can provide insights into naturally occurring size distribution.

  Server administration fundamentals

ITSA1001- - Create a domain local security group names Sales - Create two users with different names, and then add one to the Sales group and the other

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd