DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Se-Hun | - |
dc.contributor.advisor | 김세헌 | - |
dc.contributor.author | Lee, Sang-Jae | - |
dc.contributor.author | 이상재 | - |
dc.date.accessioned | 2015-04-23T06:33:38Z | - |
dc.date.available | 2015-04-23T06:33:38Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=567196&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/196975 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 산업및시스템공학과, 2011., [ ix, 101 p. ] | - |
dc.description.abstract | Network security has been receiving considerable attention in recent years. The rapid emergence of network technology has spawned various activities, such as online banking, online shopping, and financial businesses, which rely on important transactions over the Internet. This trend has been accelerated by the advent of ubiquitous computing and cloud computing. However, network intrusions are also increasing with the growth in Internet applications because the Internet was originally designed for openness. Accordingly, intruders can steal confidential information, disrupt online services and destroy systems. Such intrusions cause a loss of trust and productivity as well as extensive financial damages to a wide cross section of organizations, such as governments, universities, and commercial firms. Furthermore, attacking network resources has become a weapon of terrorism and cyberwarfare. Network security is therefore an urgent problem today. The first line of defense for network security involves several conventional techniques, such as encryption, authentication, and firewalls. Encryption and authentication techniques make network resources more secure by limiting the granting of keys to authorized uses. Firewalls mitigate malicious behavior by filtering all packets except those of authorized services. However, the limitations of these techniques render them inadequate against network intrusions that exploit simple countermeasures. Moreover, today`s network intruders are becoming more devious and sophisticated: they generate variants and continually search for new vulnerabilities. Current network systems therefore need more effective network defense methods that can analyze malicious behavior, issue warnings before an attack, and make appropriate counter-responses. This study focuses on network traffic analysis as a means of developing network defense methods. The task is challenging because network traffic generates bulk data and the data pa... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Network Traffic Analysis | - |
dc.subject | 디도스 공격 | - |
dc.subject | 기계학습 및 데이터마이닝 | - |
dc.subject | 네트워크 침해 | - |
dc.subject | 인터넷 보안 | - |
dc.subject | 네트워크 트래픽 분석 | - |
dc.subject | Internet Security | - |
dc.subject | Network Intrusion | - |
dc.subject | Machine Learning and Datamining | - |
dc.subject | DDoS attacks | - |
dc.title | Network traffic analysis and intrusion defense mechanisms based on machine learning | - |
dc.title.alternative | 기계학습 기반 네트워크 트래픽 분석 및 침해 대응에 관한 연구 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 567196/325007 | - |
dc.description.department | 한국과학기술원 : 산업및시스템공학과, | - |
dc.identifier.uid | 020065859 | - |
dc.contributor.localauthor | Kim, Se-Hun | - |
dc.contributor.localauthor | 김세헌 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.