Application of machine learning to computer network security

dc.contributor.authorJason Haydaman
dc.contributor.examiningcommitteeFerens, Ken (Electrical and Computer Engineering) Mohammed, Noman (Computer Science)en_US
dc.contributor.supervisorGilmore, Colin (Electrical and Computer Engineering) McLeod, Bob (Electrical and Computer Engineering)en_US
dc.date.accessioned2017-09-11T19:41:59Z
dc.date.available2017-09-11T19:41:59Z
dc.date.issued2017
dc.degree.disciplineElectrical and Computer Engineeringen_US
dc.degree.levelMaster of Science (M.Sc.)en_US
dc.description.abstractComputer Security covers a wide array of topics, with much of the development in the field happening outside academia. We look at intrusion detection, and evaluate the effectiveness of machine learning in the development of a commercial intrusion detection system (IDS), and compare it with conventional IDS design approaches. We attempt to create novel data sets, and examine the difficulties of extracting new features from network traffic to aid machine learning based systems. Finally, we propose a novel, near-zero overhead method of associating network packets with the process identifier (pid) of their source in real-time and demonstrate a significant performance improvement over existing methods of pid labeling.en_US
dc.description.noteOctober 2017en_US
dc.identifier.urihttp://hdl.handle.net/1993/32543
dc.language.isoengen_US
dc.rightsopen accessen_US
dc.subjectMachine learningen_US
dc.subjectComputer network securityen_US
dc.titleApplication of machine learning to computer network securityen_US
dc.typemaster thesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
jason_haydaman.pdf
Size:
1.35 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.2 KB
Format:
Item-specific license agreed to upon submission
Description: