Search or add a thesis

Advanced Search (Beta)
Home > Development of Information Security Threat Detection System Using Knowledge Discovery Techniques

Development of Information Security Threat Detection System Using Knowledge Discovery Techniques

Thesis Info

Access Option

External Link

Author

Naseer, Sheraz

Program

PhD

Institute

University of Engineering and Technology

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Engineering Computer System

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/12123/1/Sheraz%20naseer%20computer%20engg%202019%20uet%20lhr%20prr.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727734984

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Network Anomaly detection is rapidly growing field of information security due to its importance for protection of information networks. Being the first line of defense for network infrastructure, intrusion detection systems are expected to dynamically adapt with changing threat landscape. Deep learning is an evolving sub-discipline of machine learning which has delivered breakthroughs in different disciplines including natural language processing, computer vision and image processing to name a few. The successes of deep learning in aforementioned disciplines condone investigation of its application for solution of information security problems.This research aims at investigating deep learning approaches for anomaly-based intrusion detection system. In this study we propose, implement, evaluate and compare the use of Deep learning both as a refined representation learning mechanism as well as a new supervised classification mechanism for enhanced anomaly detection. Contributions of this research include Deep Supervised Learning and Deep Representation Learning for Network anomaly detection systems. For Deep Supervised Learning, anomaly detection models were developed by employing well-known deep neural network structures on both balanced and imbalanced datasets. For balanced Datasets we used four partitions of NSLKDD dataset while UNSWNB15 and ISCX2012 were employed as imbalanced datasets both of which contain 4.9% anomalous sample on average. For comparisons, conventional machine learning-based anomaly detection models were developed using well-known classification techniques. Both deep and conventional machine learning models were evaluated using standard model evaluation metrics. Results showed that DNN based anomaly detectors showed comparable or better results for detection of network anomalies. Deep Representation Learning involves using Deep learning to create efficient and effective Data representations from raw and high-dimensional network traffic data for developing anomaly detectors. Creating efficient representations from large volumes of network traffic to develop anomaly detection models is a time consuming and resource intensive task. Deep learning is proposed to automate feature extraction task in collaboration with learning subsystem to learn hierarchical representations which can be used to develop enhanced data driven anomaly detection systems. Four representation learning models were trained using well-known Deep Neural Network architectures to extract Deep representations from ISCX 2012 traffic flows. Each of these Deep representations is used to train anomaly detection models using twelve conventional Machine Learning algorithms to compare the performance of aforementioned deep representations with that of a human-engineered representation. The comparisons were performed using well known classification quality metrics. Results showed that Deep Representations perform comparable or better than human-engineered representations but require fraction of cost as compared to human-engineered representations due to inherent support of GPUs. Hyperparameter optimization of deep neural network used for current study is performed using Randomized Search. Experimental results of current research showed that Deep Neural Networks are an effective alternative for both representation learning and classification of network traffic for developing contemporary anomaly detection systems.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

5۔ تحفظ مال

5۔ تحفظ مال
مقاصد شریعت میں ایک اہم مقصد ما ل کی حفا ظت ہے۔ بنیادی ضرریات کی تکمیل کے لیے روپے پیسے اور مال کا ہونا ضروری ہے اس کے بغیر زندگی گزارنا محال ہے اور اس کا حصول بعض اوقات انسان کو موت اور کفر تک پہنچا دیتا ہے اور باعث فتنہ ہے۔ اسلام انسان کے مال کے تحفظ کے لئے اقدامات کرتا ہے اور ناجائز ذرائع سے مال کا حاصل کرنا حرام قرار دیتا ہے، جیسا کہ ارشاد باری تعالیٰ ہے:
﴿وَلَا تَأْكُلُوا أَمْوَالَكُمْ بَيْنَكُمْ بِالْبَاطِلِ ۔ ﴾253
"اور تم ایک دوسرے کا مال ناحق طریقے سے نہ کھاؤ۔ "
اس آیت کی رو سے اللہ تعالیٰ نے ہر اس طریقے سے مال کمانا حرام قرار دیا ہے جو غیر قانونی ہو اور جس کے ذریعے سے دوسرے کے مال کو ناجائز طریقے سے لینے کی کوشش کی جاتی ہو یہی وجہ ہے کہ اسلام نے مال کے مالک کو یہ ہدایت کی ہے کہ وہ حلال ذریعہ سے کمائے گئے اپنے مال کی حفا ظت کرے ۔
انسان کو دین ، اولاد ، جان اور مال بہت پیارا ہوتا ہے ان کے لیے وہ سر دھڑ کی بازی تک لگا دیتا ہے۔ اسلام نے اپنے مال کی حفاظت کرتے ہوئے مرنے والے فرد کو شہید کہا ہے ۔ عبداللہ بن عمر سے مروی ہے کہ رسول اللہ ﷺ نے ارشاد فرمایا
"مَن قُتِلَ دونَ مالِهِ؛ فهو شَهيدٌ "254
"جو اپنے مال کی حفاظت کرتے ہوئے قتل ہو جائے ، پس وہ شہید ہے۔ "
مالک کو ہدایت کی جا رہی ہے کہ مال کی حفاظت کے سلسلے میں ظاہری اسباب کو اختیار کرے، پھر اللہ تعالیٰ پر توکل کرے اور مال کو دوسروں کے رحم وکرم پر نہ چھوڑے ، جیسا کہ رسول اللہ ﷺ نے ارشاد فرمایا
"اعْقِلْهَا وَتَوَكَلْ ۔"255

انسانی صحت کے متعلق سائنسی ا ثبات احادیث نبویہﷺ کی روشنی میں تجزیاتی مطالعہ

The preachings of the Prophet (P.B.U.H) are equally beneficial for both  believers  and non-believers. While Muslims have reaped many benefits from prophetic teachings, those who do not believe in the Holy Prophet (saw) are also inclined to study his teachings and conclude that the scientific  principles we are  formulating now, were revealed by the Prophet  (P.B.U.H) many centuries ago. Whether it be the secrets of hygiene, medicine  and treatment, or matters of implicit principles of creation, Prophet Muhammad (P.B.U.H)'s teachings contain golden principles that encompass   the secrets of success in all matters ranging from the survival of human health to the matters of creation. The purpose of this article is to explain the sayings of the holy prophet*( P.B.U.H) which lead to scientific proofs and indicate that it is the teachings of the Prophet (P.B.U.H), from which today’s intellectuals deduce principles. But the Prophet ( PBUH) many years ago, made those golden principles clear  through his edicts and rulings in the time of technology scarcity.

تفسیر ابن کثیر کا حضرت ابو ہریرہ کی تفسیری روایات کی روشنی میں تحقیقی و تنقیدی جائزہ

Tafsıˆr ibn Kathıˆr, is a wellknown and widly accepted Tafsıˆr in the muslim world. Hafiz ibn Kathıˆr has referred to many aḥādīth of the Holy Prophet ﷺ in this Tafsıˆr. Despite the study of the chains of narrators thecritical study of the text of these aḥādīth has not been carried out so far. It was necessary to determine the authenticity of these Aḥādīth so that the people may have access to the authentic aḥādīth for implementation in theire day to day life. Since these aḥādīth are many in number and due to the limited time available for the completion of PhD thesis it was not possible to include all the Aḥādīth in this thesis so the scope of this thesis was restricted to the Aḥādīth of Hazarat Abuˆ Hurayrahؓ . The reason for the selection of Hazarat Abuˆ Hurayrah ؓisthat he is one the companians who has reported more Aḥādīth as compared to the other companians. Due to the large number of Aḥādīth narrated by him the possibility of ascribing fabricated Aḥādīth to him could not been ruled out. Research to the chain of narraters of Aḥādīth reported by Hadhrat Abuˆ Hurayrahؓin Tafsıˆr ibn Kathıˆr has been carried out but research to the text of these aḥādīth has not been carried out which is done in this thesis. So in this thesis a critical research of the text of Aḥādīth narrated by Hadhrat Abuˆ Hurayrahؓin Tafsıˆr ibn Kathıˆr has been carried out. There are 803 hadith reported by Hadhrat Abuˆ Hurayrah in this Tafsıˆr. After research it was found that: a. 230 aḥādīth were Da''if/Mawḍū’.No textual research of these aḥādīth was carried out as they were already fabricated and da''if .b. 115 aḥādīth were repeated in this Tafsıˆr.Some twice,some thrice and some were repeated five time.Only one out of these repeated aḥādīth was included in this research. c. 363 aḥādīth were correct from the textual point of view.No objection to the text of these aḥādīth was made.They were accepted as Sahih and were excluded from the scope of this research. d. 95 aḥādīth where objections to the text of of the hādīth could be made were left for textual research. A thorough research based upon the principles of textual study was made. As a result of this research it was found that 76 aḥādīth were correct and the objections were solved. 19 aḥādīth were completely incorrect where the objections made could not be solved.04 aḥādīth were partialy incorrect. e. The 19 aḥādīth which were considered as incorrect from textualpoint of view were against one of these Principles of Dirayat: a. They were against the verses of the Holy Quran. b. They were against the already established Sunna or aḥādīth. c.They were against the established Principals of Islam. d. They were in contradiction to already established historical events of the life of the Holy Prophet.ﷺ e. They were against the common sense/wisdom of the human beings which could not be accepted from the wisest and most intelligent person of the world ie the Holy Prophet .