Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/175514
Title: | Provenance-based intrusion detection | Authors: | Ong, Benjamin Chee Meng | Keywords: | Computer and Information Science | Issue Date: | 2024 | Publisher: | Nanyang Technological University | Source: | Ong, B. C. M. (2024). Provenance-based intrusion detection. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/175514 | Project: | SCSE23-0397 | Abstract: | In today’s digital landscape, the complexity and severity of cyberattacks are constantly growing, and it is reaching a point where it poses significant challenges to the intrusion detection systems that are currently being used. These systems are becoming less effective in recognising and mitigating sophisticated threats. This includes zero-day exploits and Advanced Persistent Threats (APTs). In order to surmount this challenge, more reliable and innovative ways to detect these intrusion and threats are needed. One of such promising approaches is to utilise provenance data, specifically provenance graphs, as a data source for the intrusion detection framework. Data provenance represents information flow between system entities as a Direct Acyclic Graph (DAG). In the context of using data provenance for an intrusion detection system, the provenance graph generated will have system entities represented as nodes, and system operations represented as directed edges. As a result, the graph that is generated will provide a comprehensive overview of activities happening within a system, tracking all the actions of every user. This makes it a valuable and informative data source to be used in an intrusion detection system. This project aims to capitalise on the potential of provenance graphs for intrusion detection. By running simulations of cyber attacks on an operating system with a provenance capture tool, extensive datasets of provenance graphs can be generated. These graphs will then be used to train and validate graph-based models. Lastly, the model will be evaluated to determine the effectiveness of using provenance based intrusion detection based on various metrics commonly used to measure the performance of neural network models. | URI: | https://hdl.handle.net/10356/175514 | Schools: | School of Computer Science and Engineering | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FYP Amended Report.pdf Restricted Access | 2.11 MB | Adobe PDF | View/Open |
Page view(s)
103
Updated on Mar 18, 2025
Download(s)
19
Updated on Mar 18, 2025
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.