Show simple item record

dc.rights.licenseCC BY-NC-ND. Users may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.
dc.contributorHendler, James A.
dc.contributorZikas, Vassilis
dc.contributorFox, Peter A.
dc.contributorKar, Koushik
dc.contributorGittens, Alex
dc.contributor.authorRastogi, Nidhi
dc.date.accessioned2021-11-03T09:03:38Z
dc.date.available2021-11-03T09:03:38Z
dc.date.created2018-10-24T13:31:20Z
dc.date.issued2018-08
dc.identifier.urihttps://hdl.handle.net/20.500.13015/2251
dc.descriptionAugust 2018
dc.descriptionSchool of Science
dc.description.abstractThis thesis proposes a new approach to intrusion detection in networks. This approach is based on Information Centrality (IC) using which systemic attacks can perform the same level of intrusion detection using approximately 50% of the total nodes. IC labels network nodes with better vantage points for detecting network-based anomalies as central nodes. The main idea is that since these central nodes already ”observe” most of the data flowing through the network, they are in a good position to detect anomalous behavior much before other nodes.
dc.description.abstractThis research first dives into the important role played by graphs in understanding the topology and flow of information. We then introduce the usage of an existing concept in the field of social networks - information centrality, a centrality based index, to minimize data collection in existing communication networks. IC identifies important nodes that can accelerate anomaly detection when armed with a suitable anomaly detection technique. We also come up with a heuristics approach that can be used instead of Information centrality in order to gather a similar outcome for very large networks. Finally, we demonstrate that in the case of systemic anomalies, central nodes are capable of identifying them much faster than other non-central nodes.
dc.description.abstractModern networked systems are in perpetual need of novel tools that can diagnose suspicious activities and thwart cyber attacks arising from diverse threats and vulnerabilities. The massive upsurge in the number of devices connected to a network and associated traffic volume, as well as an addition of new, complex technologies to existing ones have intensified the need to have a deep understanding of systems. From a security perspective, we are noticing that the user behavior is bordering high on anxiety, which is further increasing the quantum measure of data collection before rightfully understanding the legitimate need behind it. Mirroring this is the rapid inclusion of security experts as part of the core team that designs and builds platforms and networks. This increases the awareness of potential attack vectors that may impact these systems. However, data analytics (not necessarily security-related) has further intensified the need to gather as much data as possible, leaving it to the security experts to come up with tools to analyze them. While this is a daunting task for all involved parties and cannot be excused from, it is critical to scale these monitoring and analysis infrastructures to meet the demands and purpose of collecting data.
dc.description.abstractExisting technologies come in the form of intrusion detection systems like anti-virus tools, and intrusion prevention systems like firewalls. They deploy various approaches to succeed in detecting and preventing intrusions. Generally, intrusion detection techniques are classified into two categories: misuse detection and anomaly detection. However, the implementation has been ever-changing keeping the types of systems, data analysis, increasing attack surface and intrusions in mind. And with the rapid evolution in the digital milieu and an explosion in data collected, there is a need to propose novel approaches that address the big data problem in security.
dc.language.isoENG
dc.publisherRensselaer Polytechnic Institute, Troy, NY
dc.relation.ispartofRensselaer Theses and Dissertations Online Collection
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectComputer science
dc.titleA network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems
dc.typeElectronic thesis
dc.typeThesis
dc.digitool.pid179194
dc.digitool.pid179195
dc.digitool.pid179196
dc.rights.holderThis electronic version is a licensed copy owned by Rensselaer Polytechnic Institute, Troy, NY. Copyright of original work retained by author.
dc.description.degreePhD
dc.relation.departmentDept. of Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND. Users may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.
Except where otherwise noted, this item's license is described as CC BY-NC-ND. Users may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.