Discuss attacks on your selected public intrusion dataset

Assignment Help Other Subject
Reference no: EM132376381

Cyber Security and Analytics Assignment - Data Analytics for Intrusion Detection

Purpose of the assessment (with ULO) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a) Evaluate intelligent security solutions based on data analytics.

b) Analyse and interpret results from descriptive and predictive data analysis.

Assignment Overview -

For this assignment, you will analyses and evaluate one of the publicly available Network Intrusion datasets given in Table 1 (attached).

Your task is to complete and make a research report based on the following:

1- Discuss all the attacks on your selected public intrusion dataset.

2- Perform intrusion detection using the available data analytic techniques using WEKA or other platforms.

3- In consultation with your lecturer, choose at least three data analytic techniques for network intrusion detection and prepare a technical report. In the report, evaluate the performance of data analytic techniques in intrusion detection using comparative analysis.

4- Recommend the security solution using the selected data analytic technique.

Section 1: Data Analytic Tools and Techniques

In this section, your task is to complete and write a report on the following:

1. Install/deploy the data analytic platform of your choice (on Win8 VM on VirtualBox).

2. Demonstrate the use of at least two data analytic techniques (e.g. decision tree, clustering or other techniques) - you are free to use any sample testing data to demonstrate your skills and knowledge.

3. Lab demonstration: Must explain how each tool technique works in your lab prior to week 11. Data can be anything including Iris dataset.

Section 2: Evaluation of the Penetration Test (PT) of the given Dataset of UNSW in Table1

1. Select from UNSW example of the dataset, cvs, pcap and bro files to evaluate the result of the penetration test as explained below.

2. For csv files you need to generate statics to identify the total number of attacks related to DOS, Exploits, generic, reconnaissance, shellcode, and worms and display the result in a graph and shows the percentage of attacks compared to normal traffic. (need to submit the excel csv file you analyzed with your report).

3. Use Wireshark to open the cap file and generate report with different statistics related to:

Resolved address

DNS, http

Packet length

TCP Throughput

4. Use bro file and analyse results and write report on the type of traffic generated. Then, convert Bro Logs to Flows, where you can convert the Bro logs into IPFIX (using IPFIX utility) by defining your own elements and templates, then create bro report by filtering and thresholds to watch for specific events or patterns.

Section 3: Data Analytic for Network Intrusion Detection (using Weka if possible)

Perform the following tasks and write a full report on your outcomes:

1. Convert the benchmark data suitable for the data analytic tools and platform of your choice. Explain the differences in the available data format for data analytics.

2. Select the features with rationale (external reference or your own reasoning).

3. Create training and testing data samples.

4. Evaluate and select the data analytic techniques for testing.

5. Classify the network intrusion given the sample data.

6. Evaluate the performance of intrusion detection using the available tools and technologies (e.g. confusion matrix).

7. Identify the limitation of overfitting.

8. Evaluate and analyse the use of ensemble tools.

9. Recommend the data analytic solution for the network intrusion detection.

10. Discuss future research work given time and resources.

Note: Take screenshots of your work on WEKA, showing the answer of above questions. Include these screenshots in your final report.

Attachment:- Cyber Security and Analytics Assignment File.rar

Reference no: EM132376381

Questions Cloud

What is the standard deviation of returns : Suppose the standard deviation of the market return is 20%. What is the standard deviation of returns on a well-diversified portfolio with a beta of 1.3?
Calculate the npv of a project with the following cash flows : Calculate the NPV of a project with the following cash flows CF0 = $1,500, CF1 = $1,500, and CF2 = $1,125 using the discount rate of 0%.
Consider purchasing a bond at a premium : Why would any investor ever consider purchasing a bond at a premium? Wouldn't purchasing a bond at a discount always be preferable? Explain.
How much retained earnings did the firm have : Given the following information about Crane Sporting Goods, Inc., construct a balance sheet for June 30, 2017. On that date the firm had cash and marketable
Discuss attacks on your selected public intrusion dataset : Discuss all the attacks on your selected public intrusion dataset - Demonstrate the use of at least two data analytic techniques (e.g. decision tree, clustering
Is the efficient markets hypothesis : Is the Efficient Markets Hypothesis (EMH) still valid in today's market situation or is it a dated theory that is no longer relevant?
What is the expected growth rate of dorpac dividends : (a) What is the expected growth rate of Dorpac's dividends? (b) What is the expected growth rate of Dorpac's share price?
How much could you withdraw at the end : Suppose you earned a $110,000 bonus this year and invested it at 8.25% per year. How much could you withdraw at the end of each of the next 20 years?
What is the projects mirr : If the Present Value of all estimated futures costs of a 3 year new investment project is 60,

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd