The analysis of anomalous packets by data mining

碩士 === 開南大學 === 資訊學院碩士在職專班 === 106 === Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the...

Full description

Bibliographic Details
Main Authors: LU,KUN-YAN, 呂昆晏
Other Authors: HONG,GUO-MING
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/8m7279
id ndltd-TW-106KNU01392016
record_format oai_dc
spelling ndltd-TW-106KNU013920162019-07-18T03:56:05Z http://ndltd.ncl.edu.tw/handle/8m7279 The analysis of anomalous packets by data mining 運用資料探勘於網路封包之異常分析 LU,KUN-YAN 呂昆晏 碩士 開南大學 資訊學院碩士在職專班 106 Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the attack. Effective detection as a more effective preventive measure is mainly to avoid making the affected computer's affected disasters expand or cause irreparable situations. Therefore, the use of data mining technology in this paper to classify traffic has reduced the chance of computers being infected by malicious software. In this study, we will use Company A's system network architecture to use data mining technology to analyze network abnormal packets that are suspected to have been infected by malicious software. This will provide insight into the system and network after malicious software is invaded. The direct impact of the road, and then through the network of abnormal packets as the information obtained after the classification analysis, you can learn more about malicious software virus code transmission mechanism and attack methods and so on. However, malicious software has been deliberately adding noise, changing the length of the packet, or delaying sending the packet, which will make it difficult to analyze. In this research, malicious software intrusion and attacks will be simulated. After the computer is invaded, attack instructions or data instructions will be issued. The system that has been infected with malicious software will cause the system exception or abnormal network caused by the relevant intrusion and attack packets. After using network packets to capture software, abnormal traffic packets are collected and used for data analysis for data analysis. HONG,GUO-MING 洪國銘 2018 學位論文 ; thesis 51 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 開南大學 === 資訊學院碩士在職專班 === 106 === Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the attack. Effective detection as a more effective preventive measure is mainly to avoid making the affected computer's affected disasters expand or cause irreparable situations. Therefore, the use of data mining technology in this paper to classify traffic has reduced the chance of computers being infected by malicious software. In this study, we will use Company A's system network architecture to use data mining technology to analyze network abnormal packets that are suspected to have been infected by malicious software. This will provide insight into the system and network after malicious software is invaded. The direct impact of the road, and then through the network of abnormal packets as the information obtained after the classification analysis, you can learn more about malicious software virus code transmission mechanism and attack methods and so on. However, malicious software has been deliberately adding noise, changing the length of the packet, or delaying sending the packet, which will make it difficult to analyze. In this research, malicious software intrusion and attacks will be simulated. After the computer is invaded, attack instructions or data instructions will be issued. The system that has been infected with malicious software will cause the system exception or abnormal network caused by the relevant intrusion and attack packets. After using network packets to capture software, abnormal traffic packets are collected and used for data analysis for data analysis.
author2 HONG,GUO-MING
author_facet HONG,GUO-MING
LU,KUN-YAN
呂昆晏
author LU,KUN-YAN
呂昆晏
spellingShingle LU,KUN-YAN
呂昆晏
The analysis of anomalous packets by data mining
author_sort LU,KUN-YAN
title The analysis of anomalous packets by data mining
title_short The analysis of anomalous packets by data mining
title_full The analysis of anomalous packets by data mining
title_fullStr The analysis of anomalous packets by data mining
title_full_unstemmed The analysis of anomalous packets by data mining
title_sort analysis of anomalous packets by data mining
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/8m7279
work_keys_str_mv AT lukunyan theanalysisofanomalouspacketsbydatamining
AT lǚkūnyàn theanalysisofanomalouspacketsbydatamining
AT lukunyan yùnyòngzīliàotànkānyúwǎnglùfēngbāozhīyìchángfēnxī
AT lǚkūnyàn yùnyòngzīliàotànkānyúwǎnglùfēngbāozhīyìchángfēnxī
AT lukunyan analysisofanomalouspacketsbydatamining
AT lǚkūnyàn analysisofanomalouspacketsbydatamining
_version_ 1719228004572332032