Design and conduct experiments to validate

Assignment Help Other Engineering
Reference no: EM133148291

COMP8325 Applications of Artificial Intelligence for Cyber Security - Macquarie University

Assignment - Description

Learning Outcome 1: Explain the basic concepts and the limitations of Artificial Intelligence;

Learning Outcome 2: Detect intrusion in networks and systems by applying tools and techniques revealing abnormal patterns in datasets; and

Learning Outcome 3: Analyse the trends of applications of Artificial Intelligence in cyber security.

TASK 1: Merits of Entropy in Attack Detection/Diagnostics

Consider a server-log dataset hosted at Google Drive. Two attacks happened on a day, both somewhere around 8am and noon. Please answer the following questions:

- Identify the exact date and time1. What approach did the attackers use?

There has been significant literature23 discussing how entropy can be used to detect these attacks. To do it effectively, approximation schemes are usually used. You do not have to implement these approximation techniques, but do present an analysis of whether entropy is useful and which com- binations you tried, e.g. src ip, dest ip, src-port, dst-port, etc. Do any reveal anomalies when the two attacks happen?

TASK 2: Web Tracking

A typical webpage consists of several web-components, e.g., JavaScript codes, Flash-content, images, CSS, etc. When a user opens a website in a web browser, the fetched webpage typically generates several other HTTP(S) connections for downloading additional components of the webpage. These components can be downloaded from the website visited by the user (referred to as first-party domain) or downloaded from other third-party domains. Here, we focus on one type of web-component, namely JavaScript codes, which is loaded both from first- and third-party domains. JavaScript programs are widely used by ad networks, content distribution networks (CDNs), tracking services, analytics platforms, and online social networks (e.g., Facebook uses them to implement plugins)

Figure1 illustrates a typical scenario of web tracking via JavaScript codes. Upon fetching a webpage from first-party domains (steps 1 & 2), the user's web browser interprets the HTML tags and executes JavaScript programs within the HTML script tags. JavaScript code execution enables the web browser to send requests to retrieve additional content from third-party domains (step 3). Depending on the implemented function- alities, the JavaScript programs can be considered as useful (functional), e.g., fetching content from a CDN, or as tracking. In the latter case, when the webpage is completely rendered (step 4), the JavaScript codes track user's activities on the webpage, write to or read from the cookie database (steps 5 & 6), or reconstruct user identifiers. Tracking JavaScript programs may also be used to fingerprint user's browser (as well as system) and to transfer private and sensitive information to third-party domains (step 7).

Now, imagine your are given a task to develop a machine-learning based on only class(i.e., One Class SVM or Positive Unlabelled (PU) Learning, see ref4) technique to differentiate tracking JavaScript codes from functional ones. To this end you are provided with labelled dataset (see COMP8325's iLearn page) containing labelled functional and tracking JavaScript codes. Here may use the code provided at iLearn to do the following tasks.

Use Term Frequency - Inverse Document Frequency (TF-IDF) to extract features from functional and tracking JavaScript codes.

Develop either One-Class SVM or PU Learning, and a baseline SVM for comparison, to classify the JavaScript codes.
Design and conduct experiments to validate and test the efficacy of your developed model:
- To report any over- or under-fitting of the models, you may use 60% of the data for testing, 20% for validation, and 20% for the testing.
- Report and discuss the parameters of OCSVM or PU Learning model which give your improved results.

Attachment:- Artificial Intelligence for Cyber Security.rar

 

Reference no: EM133148291

Questions Cloud

Put together a common-size income statement for each year : Chipotle Mexican Grill began with single location in 1993 and now operates more than 2,450 restaurants. Put together common-size income statement for each year
Significant visual and motor defects : A 42-year-old father has a life threatening brain tumor. Without surgery, the father is expected to live less than three months. Aggressive surgery may give the
Foods that are on america endangered foods list : List the top 10 foods that are on America's Endangered Foods list. Give a brief explanation of why each is endangered.
Concept of justice and the utilitarian and libertarian : Describe the concept of justice and the utilitarian and libertarian approaches to justice.
Design and conduct experiments to validate : Develop either One-Class SVM or PU Learning, and a baseline SVM for comparison, to classify the JavaScript codes
What factors would make you stay at an organization : What factors would make you stay at an organization and not leave for another competitor?
Determine the material price variance : Determine the material price variance and the material quantity variance for March. Indicate whether each variance is favorable or unfavorable
What should frazer do if he would like to continue : What should Frazer do if he would like to continue advancing at Hudson?
Whs suggestions from staff : What are the requirements for recording and following up on WHS suggestions from Staff? How can this be done?

Reviews

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd