Zero-day Attack Identification in Streaming data: Nearest Neighbor Heuristics and Dynamic Semantic Network Generation in the Spark eco-system

dc.contributor.advisorKarabatis, George
dc.contributor.authorPallaprolu, Sai Chaithanya
dc.contributor.departmentInformation Systems
dc.contributor.programInformation Systems
dc.date.accessioned2019-10-11T13:59:18Z
dc.date.available2019-10-11T13:59:18Z
dc.date.issued2017-01-01
dc.description.abstractIntrusion Detection Systems (IDS's) have been in existence for many years now, but they fall short in efficiently detecting zero-day attacks. Over the past decade, anomaly detection has attracted wide attention of numerous researchers to overcome the shortcomings of IDSs (Intrusion Detection Systems) in detecting zero-day attacks. In this research, we design an organic combination of Semantic Link Networks (SLN) and Dynamic Graph generation for the zero-day attacks on the fly into one comprehensive system. Furthermore, to deal with increasing volumes of network traffic and improve full packet analysis efficiency, we employ Spark Streaming platform for parallel detection. To substantiate the performance of zero-day attack detection process; we calculate the relevance of each feature in KDD'99 intrusion detection datasets. Compared to the previous studies on Zero-day attack identification, we witnessed comparably good results as we employed semantic learning and reasoning on top of the training data and also collaborative classification methods.
dc.genretheses
dc.identifierdoi:10.13016/m27xbj-dti1
dc.identifier.other11636
dc.identifier.urihttp://hdl.handle.net/11603/15632
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu
dc.sourceOriginal File Name: Pallaprolu_umbc_0434M_11636.pdf
dc.titleZero-day Attack Identification in Streaming data: Nearest Neighbor Heuristics and Dynamic Semantic Network Generation in the Spark eco-system
dc.typeText
dcterms.accessRightsDistribution Rights granted to UMBC by the author.

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Pallaprolu_umbc_0434M_11636.pdf
Size:
2.23 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
PallaproluS_Zeroday_Open.pdf
Size:
43.18 KB
Format:
Adobe Portable Document Format
Description: