Perform intrusion detection using data analytic techniques

Assignment Help Other Subject
Reference no: EM132372309

Cyber Security and Analytics Assignment - Data Analytics for Intrusion Detection

Purpose of the assessment (with ULO) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a) Evaluate intelligent security solutions based on data analytics.

b) Analyse and interpret results from descriptive and predictive data analysis.

Assignment Overview -

For this assignment, you will analyses and evaluate one of the publicly available Network Intrusion datasets given in Table 1 (attached).

Your task is to complete and make a research report based on the following:

1- Discuss all the attacks on your selected public intrusion dataset.

2- Perform intrusion detection using the available data analytic techniques using WEKA or other platforms.

3- In consultation with your lecturer, choose at least three data analytic techniques for network intrusion detection and prepare a technical report. In the report, evaluate the performance of data analytic techniques in intrusion detection using comparative analysis.

4- Recommend the security solution using the selected data analytic technique.

Section 1: Data Analytic Tools and Techniques

In this section, your task is to complete and write a report on the following:

1. Install/deploy the data analytic platform of your choice (on Win8 VM on VirtualBox).

2. Demonstrate the use of at least two data analytic techniques (e.g. decision tree, clustering or other techniques) - you are free to use any sample testing data to demonstrate your skills and knowledge.

3. Lab demonstration: Must explain how each tool technique works in your lab prior to week 11. Data can be anything including Iris dataset.

Section 2: Evaluation of the Penetration Test (PT) of the given Dataset of UNSW in Table1

1. Select from UNSW example of the dataset, cvs, pcap and bro files to evaluate the result of the penetration test as explained below.

2. For csv files you need to generate statics to identify the total number of attacks related to DOS, Exploits, generic, reconnaissance, shellcode, and worms and display the result in a graph and shows the percentage of attacks compared to normal traffic. (need to submit the excel csv file you analyzed with your report).

3. Use Wireshark to open the cap file and generate report with different statistics related to:

Resolved address

DNS, http

Packet length

TCP Throughput

4. Use bro file and analyse results and write report on the type of traffic generated. Then, convert Bro Logs to Flows, where you can convert the Bro logs into IPFIX (using IPFIX utility) by defining your own elements and templates, then create bro report by filtering and thresholds to watch for specific events or patterns.

Section 3: Data Analytic for Network Intrusion Detection (using Weka if possible)

Perform the following tasks and write a full report on your outcomes:

1. Convert the benchmark data suitable for the data analytic tools and platform of your choice. Explain the differences in the available data format for data analytics.

2. Select the features with rationale (external reference or your own reasoning).

3. Create training and testing data samples.

4. Evaluate and select the data analytic techniques for testing.

5. Classify the network intrusion given the sample data.

6. Evaluate the performance of intrusion detection using the available tools and technologies (e.g. confusion matrix).

7. Identify the limitation of overfitting.

8. Evaluate and analyse the use of ensemble tools.

9. Recommend the data analytic solution for the network intrusion detection.

10. Discuss future research work given time and resources.

Note: Take screenshots of your work on WEKA, showing the answer of above questions. Include these screenshots in your final report.

Attachment:- Cyber Security and Analytics Assignment File.rar

Reference no: EM132372309

Questions Cloud

Demonstrate connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Cyber-attack modelling analysis techniques : Cyber-Attack Modelling Analysis Techniques
What lessons have you learned from case about product design : Why is a square watermelon an advantage based on this case? What lessons have you learned from this case about product design?
Develop a preliminary prototype for e-commerce website : Use the assigned URL supplied to you by your WordPress to develop a preliminary prototype of your proposed e-commerce website
Perform intrusion detection using data analytic techniques : MITAustralia - MN623 Cyber Security and Analytics Assignment - Data Analytics for Intrusion Detection. Perform intrusion detection using data analytic technique
Implementation of knowledge management at a global company : Give your views on failure of implementation of knowledge management at a global company based on five distinct stages of knowledge management
What is the start time for calculating the decline in value : HA3042 Taxation Law Individual Assignment, Holmes Institute, Australia. What is the start time for calculating the decline in value
Estimate the trend using a centered moving average : Estimate the trend using a centered moving average and Using a classical additive decomposition, calculate the seasonal component
Analyze analysis of variance with repeated measures : Analyze analysis of variance with repeated measures in a dataset - Apply statistical software to analyze data - Critique research studies that apply analysis

Reviews

len2372309

9/18/2019 5:44:23 AM

Word limit - 1200-1500 words. All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Marking Rubrics - Introduction is clear and easy to follow. Consistency logical and convincing. Components present with good cohesive. Components present with good cohesion. Clear referencing/ style. Properly written, with some minor deficiencies.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd