With the rapid development of information technology, network traffic is also increasing dramatically. However, many cyber-attack records are buried in this large amount of network trafficking. Therefore, many Intrusion Detection Systems (IDS) that can extract those malicious activities have been developed. Zeek is one of them, and due to its powerful functions and open-source environment, Zeek has been adapted by many organizations. Information Technology at Purdue (ITaP), which uses Zeek as their IDS, captures netflow logs for all the network activities in the whole campus area but has not delved into effective use of the information. This thesis examines ways to help increase the performance of anomaly detection. As a result, this projec...
The objective of this research is to test if newer machine learning libraries and detection methods ...
Intrusion detection system has become an important component of a network infrastructure protection ...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
With the rapid development of information technology, network traffic is also increasing dramaticall...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
While computer networks and the massive amount of communication taking place on these networks grow,...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
A computer system generates logs to record all relevant operational data about the system and all op...
The quick progress in the web and networking domains has taken place by means of a huge growth of th...
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and a...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The internet is essential for ongoing contact in the modern world, yet its effectiveness might lesse...
The world has experienced a radical change due to the internet. As a matter of fact, it assists peop...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
The objective of this research is to test if newer machine learning libraries and detection methods ...
Intrusion detection system has become an important component of a network infrastructure protection ...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...
With the rapid development of information technology, network traffic is also increasing dramaticall...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
While computer networks and the massive amount of communication taking place on these networks grow,...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
A computer system generates logs to record all relevant operational data about the system and all op...
The quick progress in the web and networking domains has taken place by means of a huge growth of th...
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and a...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The internet is essential for ongoing contact in the modern world, yet its effectiveness might lesse...
The world has experienced a radical change due to the internet. As a matter of fact, it assists peop...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
The objective of this research is to test if newer machine learning libraries and detection methods ...
Intrusion detection system has become an important component of a network infrastructure protection ...
The proliferation in usage and complexity of modern communication and network systems, a large numbe...