The analysis of anomalous packets by data mining
碩士 === 開南大學 === 資訊學院碩士在職專班 === 106 === Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/8m7279 |
id |
ndltd-TW-106KNU01392016 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106KNU013920162019-07-18T03:56:05Z http://ndltd.ncl.edu.tw/handle/8m7279 The analysis of anomalous packets by data mining 運用資料探勘於網路封包之異常分析 LU,KUN-YAN 呂昆晏 碩士 開南大學 資訊學院碩士在職專班 106 Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the attack. Effective detection as a more effective preventive measure is mainly to avoid making the affected computer's affected disasters expand or cause irreparable situations. Therefore, the use of data mining technology in this paper to classify traffic has reduced the chance of computers being infected by malicious software. In this study, we will use Company A's system network architecture to use data mining technology to analyze network abnormal packets that are suspected to have been infected by malicious software. This will provide insight into the system and network after malicious software is invaded. The direct impact of the road, and then through the network of abnormal packets as the information obtained after the classification analysis, you can learn more about malicious software virus code transmission mechanism and attack methods and so on. However, malicious software has been deliberately adding noise, changing the length of the packet, or delaying sending the packet, which will make it difficult to analyze. In this research, malicious software intrusion and attacks will be simulated. After the computer is invaded, attack instructions or data instructions will be issued. The system that has been infected with malicious software will cause the system exception or abnormal network caused by the relevant intrusion and attack packets. After using network packets to capture software, abnormal traffic packets are collected and used for data analysis for data analysis. HONG,GUO-MING 洪國銘 2018 學位論文 ; thesis 51 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 開南大學 === 資訊學院碩士在職專班 === 106 === Malicious software still poses a great threat to cyber security and users. This paper focuses on further understanding the impact of malicious software on the information and hopes that the malicious software will be able to launch threats before launching the attack. Effective detection as a more effective preventive measure is mainly to avoid making the affected computer's affected disasters expand or cause irreparable situations. Therefore, the use of data mining technology in this paper to classify traffic has reduced the chance of computers being infected by malicious software. In this study, we will use Company A's system network architecture to use data mining technology to analyze network abnormal packets that are suspected to have been infected by malicious software. This will provide insight into the system and network after malicious software is invaded. The direct impact of the road, and then through the network of abnormal packets as the information obtained after the classification analysis, you can learn more about malicious software virus code transmission mechanism and attack methods and so on. However, malicious software has been deliberately adding noise, changing the length of the packet, or delaying sending the packet, which will make it difficult to analyze. In this research, malicious software intrusion and attacks will be simulated. After the computer is invaded, attack instructions or data instructions will be issued. The system that has been infected with malicious software will cause the system exception or abnormal network caused by the relevant intrusion and attack packets. After using network packets to capture software, abnormal traffic packets are collected and used for data analysis for data analysis.
|
author2 |
HONG,GUO-MING |
author_facet |
HONG,GUO-MING LU,KUN-YAN 呂昆晏 |
author |
LU,KUN-YAN 呂昆晏 |
spellingShingle |
LU,KUN-YAN 呂昆晏 The analysis of anomalous packets by data mining |
author_sort |
LU,KUN-YAN |
title |
The analysis of anomalous packets by data mining |
title_short |
The analysis of anomalous packets by data mining |
title_full |
The analysis of anomalous packets by data mining |
title_fullStr |
The analysis of anomalous packets by data mining |
title_full_unstemmed |
The analysis of anomalous packets by data mining |
title_sort |
analysis of anomalous packets by data mining |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/8m7279 |
work_keys_str_mv |
AT lukunyan theanalysisofanomalouspacketsbydatamining AT lǚkūnyàn theanalysisofanomalouspacketsbydatamining AT lukunyan yùnyòngzīliàotànkānyúwǎnglùfēngbāozhīyìchángfēnxī AT lǚkūnyàn yùnyòngzīliàotànkānyúwǎnglùfēngbāozhīyìchángfēnxī AT lukunyan analysisofanomalouspacketsbydatamining AT lǚkūnyàn analysisofanomalouspacketsbydatamining |
_version_ |
1719228004572332032 |