Show simple item record

dc.contributor.authorBalkanli, Eray
dc.date.accessioned2015-04-27T17:52:51Z
dc.date.available2015-04-27T17:52:51Z
dc.date.issued2015-04-27
dc.identifier.urihttp://hdl.handle.net/10222/56583
dc.description.abstractSince the occurrence and variety of Distributed Denial of Service (DDoS) has dramatically increased, the discovery of DDoS signatures (rules) become very difficult for current intrusion detection mechanisms. Darknets, which refer to unallocated Internet Protocol (IP) addresses in a network, are used to collect attack traffic to reveal the potential signatures. Backscatter, a behaviour observed in darknets, is a side effect of DDoS attacks generated by victim responds to the spoofed IP addresses. This thesis explores general backscatter patterns mostly based on the major transport, network and application layer protocols and ports. A detailed evaluation expressing the performances of five different signature-based network traffic monitoring systems, namely Snort, Bro, Iatmon, Corsaro and Cisco's Adaptive Security Appliance (ASA) 5515-X, over backscatter traffic is also presented. Moreover, this thesis analyzes the performances of three machine learning techniques, namely C4.5 Decision Tree, Naive Bayes and AdaBoost.M1, in terms of the detection rate, false alarm rate, computational cost and ease of use of these techniques. Additionally, different training sets with different sizes and different feature sets are used to study the effects of training datasets and data pre-processing, respectively. Five different feature sets depending on the two well-known feature selection approaches, namely Chi-Square and Symmetrical Uncertainty, as well as the most commonly used features in the literature are included in these studies. All of the evaluations are performed on six different publicly available one-way darknet datasets collected between 2004 and 2012 by CAIDA. The results show that the attack trends in the employed datasets are important to understand the nature of DDoS traffic. Furthermore, the signatures generated by a machine learning system are robust in detecting DDoS traffic even when the training set is small and the attack trends are changing over time.en_US
dc.language.isoen_USen_US
dc.subjectnetwork traffic monitoringen_US
dc.subjectone-way trafficen_US
dc.subjectmachine learningen_US
dc.titleA Comprehensive Study On One-way Backscatter Traffic Analysisen_US
dc.date.defence2015-04-13
dc.contributor.departmentFaculty of Computer Scienceen_US
dc.contributor.degreeMaster of Computer Scienceen_US
dc.contributor.external-examinern/aen_US
dc.contributor.graduate-coordinatorEvangelos Miliosen_US
dc.contributor.thesis-readerSrinivas Sampallien_US
dc.contributor.thesis-readerMalcolm Heywooden_US
dc.contributor.thesis-supervisorA. Nur Zincir-Heywooden_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.manuscriptsNoen_US
dc.contributor.copyright-releaseNoen_US
 Find Full text

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record