Design and conduct experiments to validate

Assignment Help Other Engineering
Reference no: EM133148291

COMP8325 Applications of Artificial Intelligence for Cyber Security - Macquarie University

Assignment - Description

Learning Outcome 1: Explain the basic concepts and the limitations of Artificial Intelligence;

Learning Outcome 2: Detect intrusion in networks and systems by applying tools and techniques revealing abnormal patterns in datasets; and

Learning Outcome 3: Analyse the trends of applications of Artificial Intelligence in cyber security.

TASK 1: Merits of Entropy in Attack Detection/Diagnostics

Consider a server-log dataset hosted at Google Drive. Two attacks happened on a day, both somewhere around 8am and noon. Please answer the following questions:

- Identify the exact date and time1. What approach did the attackers use?

There has been significant literature23 discussing how entropy can be used to detect these attacks. To do it effectively, approximation schemes are usually used. You do not have to implement these approximation techniques, but do present an analysis of whether entropy is useful and which com- binations you tried, e.g. src ip, dest ip, src-port, dst-port, etc. Do any reveal anomalies when the two attacks happen?

TASK 2: Web Tracking

A typical webpage consists of several web-components, e.g., JavaScript codes, Flash-content, images, CSS, etc. When a user opens a website in a web browser, the fetched webpage typically generates several other HTTP(S) connections for downloading additional components of the webpage. These components can be downloaded from the website visited by the user (referred to as first-party domain) or downloaded from other third-party domains. Here, we focus on one type of web-component, namely JavaScript codes, which is loaded both from first- and third-party domains. JavaScript programs are widely used by ad networks, content distribution networks (CDNs), tracking services, analytics platforms, and online social networks (e.g., Facebook uses them to implement plugins)

Figure1 illustrates a typical scenario of web tracking via JavaScript codes. Upon fetching a webpage from first-party domains (steps 1 & 2), the user's web browser interprets the HTML tags and executes JavaScript programs within the HTML script tags. JavaScript code execution enables the web browser to send requests to retrieve additional content from third-party domains (step 3). Depending on the implemented function- alities, the JavaScript programs can be considered as useful (functional), e.g., fetching content from a CDN, or as tracking. In the latter case, when the webpage is completely rendered (step 4), the JavaScript codes track user's activities on the webpage, write to or read from the cookie database (steps 5 & 6), or reconstruct user identifiers. Tracking JavaScript programs may also be used to fingerprint user's browser (as well as system) and to transfer private and sensitive information to third-party domains (step 7).

Now, imagine your are given a task to develop a machine-learning based on only class(i.e., One Class SVM or Positive Unlabelled (PU) Learning, see ref4) technique to differentiate tracking JavaScript codes from functional ones. To this end you are provided with labelled dataset (see COMP8325's iLearn page) containing labelled functional and tracking JavaScript codes. Here may use the code provided at iLearn to do the following tasks.

Use Term Frequency - Inverse Document Frequency (TF-IDF) to extract features from functional and tracking JavaScript codes.

Develop either One-Class SVM or PU Learning, and a baseline SVM for comparison, to classify the JavaScript codes.
Design and conduct experiments to validate and test the efficacy of your developed model:
- To report any over- or under-fitting of the models, you may use 60% of the data for testing, 20% for validation, and 20% for the testing.
- Report and discuss the parameters of OCSVM or PU Learning model which give your improved results.

Attachment:- Artificial Intelligence for Cyber Security.rar

 

Reference no: EM133148291

Questions Cloud

Put together a common-size income statement for each year : Chipotle Mexican Grill began with single location in 1993 and now operates more than 2,450 restaurants. Put together common-size income statement for each year
Significant visual and motor defects : A 42-year-old father has a life threatening brain tumor. Without surgery, the father is expected to live less than three months. Aggressive surgery may give the
Foods that are on america endangered foods list : List the top 10 foods that are on America's Endangered Foods list. Give a brief explanation of why each is endangered.
Concept of justice and the utilitarian and libertarian : Describe the concept of justice and the utilitarian and libertarian approaches to justice.
Design and conduct experiments to validate : Develop either One-Class SVM or PU Learning, and a baseline SVM for comparison, to classify the JavaScript codes
What factors would make you stay at an organization : What factors would make you stay at an organization and not leave for another competitor?
Determine the material price variance : Determine the material price variance and the material quantity variance for March. Indicate whether each variance is favorable or unfavorable
What should frazer do if he would like to continue : What should Frazer do if he would like to continue advancing at Hudson?
Whs suggestions from staff : What are the requirements for recording and following up on WHS suggestions from Staff? How can this be done?

Reviews

Write a Review

Other Engineering Questions & Answers

  How sas is helped to prepare the qliksense

Prepare the 4500 words documentation of how SAS is helped to prepare the reports by using QlikView and QlikSense?Provide example

  Benefits of it service management for business

Introduction to Ethics and Service Management - What is IT service management? What are the benefits of IT service management for business

  What are ethical and practical issues

What are the ethical and practical issues that complicate the use of alternative dispute resolution techniques? How can these be overcome or minimized?

  What is the pressure drop across the pipe

what is the pressure drop across the pipe? what is the shear stress exerted on the pipe boundary? what is the shear velocity? what is the darcy friction factor?

  Differences between your linear and non-linear models

ENEM20001 - Dynamic modelling and Analysis - Based on initial research and speculations of quad bike use. The design should also be informed by an iterative

  Define project

Define project.Define the term project objective, and give some examples.List some examples of resources that are used on a project

  What are three major divisons of the construction industry

What professionals are responsible for the prepara-non of construction documents? What are the three major divisons of the construction industry?

  Summarise the steps in the development of an open pit mine

Draw a plan of a typical strip mine showing all operational features and equipment - Summarise the steps in the development of an open pit mine. b. What are the purposes of safety benches?

  Pinhole develops and the gas slowly leaks

Fifteen kg of the carbon dioxide (CO2) gas is fed to a cylinder having a volume of 20 m3 and initially containing 15kg of CO2 at a pressure of 10bar. Later a pinhole develops and the gas slowly leaks from the cylinder. Determine

  Construct circuit in multisim using calculated values for v

Construct circuit in MultiSIM using calculated values for V1. Capture a screenshot that shows V1 and V2 on an oscilloscope XSC1. Submit calculations, MultSIM screenshot and MultiSIM circuit (.ms11) file.

  Develop a bill of material and order parts

Describe the product in you are planning to design using a brief report and discuss the safety features you would incorporate in to the design for the safety of users and to comply with industry requirements in Australia.

  A medical infusion pump operates in the following mannerthe

a medical infusion pump operates in the following mannerthe user selects the infusion rate between 00.0 and 99.9 ml per

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd