Network traffic analysis and intrusion defense mechanisms based on machine learning기계학습 기반 네트워크 트래픽 분석 및 침해 대응에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 488
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Se-Hun-
dc.contributor.advisor김세헌-
dc.contributor.authorLee, Sang-Jae-
dc.contributor.author이상재-
dc.date.accessioned2015-04-23T06:33:38Z-
dc.date.available2015-04-23T06:33:38Z-
dc.date.issued2011-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=567196&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/196975-
dc.description학위논문(박사) - 한국과학기술원 : 산업및시스템공학과, 2011., [ ix, 101 p. ]-
dc.description.abstractNetwork security has been receiving considerable attention in recent years. The rapid emergence of network technology has spawned various activities, such as online banking, online shopping, and financial businesses, which rely on important transactions over the Internet. This trend has been accelerated by the advent of ubiquitous computing and cloud computing. However, network intrusions are also increasing with the growth in Internet applications because the Internet was originally designed for openness. Accordingly, intruders can steal confidential information, disrupt online services and destroy systems. Such intrusions cause a loss of trust and productivity as well as extensive financial damages to a wide cross section of organizations, such as governments, universities, and commercial firms. Furthermore, attacking network resources has become a weapon of terrorism and cyberwarfare. Network security is therefore an urgent problem today. The first line of defense for network security involves several conventional techniques, such as encryption, authentication, and firewalls. Encryption and authentication techniques make network resources more secure by limiting the granting of keys to authorized uses. Firewalls mitigate malicious behavior by filtering all packets except those of authorized services. However, the limitations of these techniques render them inadequate against network intrusions that exploit simple countermeasures. Moreover, today`s network intruders are becoming more devious and sophisticated: they generate variants and continually search for new vulnerabilities. Current network systems therefore need more effective network defense methods that can analyze malicious behavior, issue warnings before an attack, and make appropriate counter-responses. This study focuses on network traffic analysis as a means of developing network defense methods. The task is challenging because network traffic generates bulk data and the data pa...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectNetwork Traffic Analysis-
dc.subject디도스 공격-
dc.subject기계학습 및 데이터마이닝-
dc.subject네트워크 침해-
dc.subject인터넷 보안-
dc.subject네트워크 트래픽 분석-
dc.subjectInternet Security-
dc.subjectNetwork Intrusion-
dc.subjectMachine Learning and Datamining-
dc.subjectDDoS attacks-
dc.titleNetwork traffic analysis and intrusion defense mechanisms based on machine learning-
dc.title.alternative기계학습 기반 네트워크 트래픽 분석 및 침해 대응에 관한 연구-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN567196/325007 -
dc.description.department한국과학기술원 : 산업및시스템공학과, -
dc.identifier.uid020065859-
dc.contributor.localauthorKim, Se-Hun-
dc.contributor.localauthor김세헌-
Appears in Collection
IE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0