Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/60991
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGui, Shengyu
dc.date.accessioned2014-06-04T01:37:57Z
dc.date.available2014-06-04T01:37:57Z
dc.date.copyright2014en_US
dc.date.issued2014
dc.identifier.urihttp://hdl.handle.net/10356/60991
dc.description.abstractThis report presents two models that are used to detect the user abnormal behavior and network intrusion respectively. The user abnormal behavior detection model uses the pattern-matching techniques to identify the user. The intrusion detection model detects intrusion based on known intrusion patterns and normal Internet traffic parameters. The process of user abnormality detection is to first collect and analyze user input and internet traffic information, classify the user activities to specific types and build signatures database of each activity type. Then users are identified by those signatures after login. The signature consists of the user input signature and the internet traffic information. The intrusion detection model aims to detect intrusion based on normal internet traffic parameters and operational values. Since Denial-of-service is one of the intrusions that can be easily launched and pose great threat to network and workstations, therefore, the model focus on detecting DOS attack. TCP flood attack and ICMP flood attack are simulated for intrusion detection testing. The functionality of these two models is to provide a more secure working and network environment for individuals continuously.en_US
dc.format.extent66 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systemsen_US
dc.titleInternet traffic analysisen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorTan Yap Pengen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
FYPReport.pdf
  Restricted Access
4.68 MBAdobe PDFView/Open

Page view(s)

332
Updated on Apr 17, 2025

Download(s)

7
Updated on Apr 17, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.