Anomaly detection based on machine learning techniques
dc.contributor.author | Dilli, Ramesh Babu | |
dc.date.accessioned | 2019-11-18T17:58:09Z | |
dc.date.available | 2019-11-18T17:58:09Z | |
dc.date.graduationmonth | December | |
dc.date.issued | 2019-12-01 | |
dc.description.abstract | This report presents an experimental exploration of supervised inductive learning methods for the task of Domain Name Service (DNS) query filtering for anomaly detection. The anomaly types for which I implement a learning monitor represent specific attack vectors, such as distributed denial-of-service (DDOS), remote-to-user (R2U), and probing, that have been increasing in size and sophistication in recent years. A number of anomaly detection measures, such as honeynet-based and Intrusion Detection System (IDS)-based, have been proposed. However, IDS-based solutions that use signatures seem to be ineffective, because attackers associated with recent anomalies are equipped with sophisticated code update and evasion techniques. By contrast, anomaly detection methods do not require pre-built signatures and thus have the capability to detect new or unknown anomalies. Towards this end, this project implements and applies an anomaly detection model learned from DNS query data and evaluates the effectiveness of an implementation of this model using popular machine learning techniques. Experimental results show how this machine learning approach uses existing inductive learning algorithms such as k-NN (k-nearest neighbour), Decision trees and Naive Bayes can be used effectively in anomaly detection. | |
dc.description.advisor | William H. Hsu | |
dc.description.degree | Master of Science | |
dc.description.department | Department of Computer Science | |
dc.description.level | Masters | |
dc.identifier.uri | http://hdl.handle.net/2097/40286 | |
dc.language.iso | en_US | |
dc.publisher | Kansas State University | |
dc.rights | © the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.subject | Anomaly | |
dc.title | Anomaly detection based on machine learning techniques | |
dc.type | Report |