Difference between revisions of "Projects:2016s1-102 Classifying Internet Applications and Detecting Malicious Traffic from Network Communications"

From Projects
Jump to: navigation, search
(Introduction)
(Introduction)
Line 17: Line 17:
 
'''Project Description:'''
 
'''Project Description:'''
  
The project aim is to accurately identify internet applications and detect malicious traffic from NetFlow data. For this project, the outcomes infers several motivations:  
+
The project aim is to accurately identify internet applications and detect malicious traffic from NetFlow data. For this project, from the outcomes, several motivations are realised:  
  
- Determine network resource demands within a network.
+
- Determining network resource demands within a network.
  
- Determine the traffic load of the inspected network.
+
- Determining the traffic load of the inspected network.
  
- Identify applications of interest within the inspected network.
+
- Identifying applications of interest within the inspected network.
  
In collaboration with the Defence Science and Technology Group (DSTG) and the University of Adelaide (UofA), a two step model consisting of a bootstrap classification stage and a calibration classification stage will be developed in order to inspect NetFlow data, which identifies internet classes and creates Traffic Activity Graphs (TAG). The two step model will make use of deep packet inspection and Machine Learning techniques to generate the required outputs.  
+
In collaboration with the Defence Science and Technology Group (DSTG) and the University of Adelaide (UofA), a two step model consisting of a bootstrap classification stage and a calibration classification stage will be developed in order to inspect NetFlow data, which identifies internet classes and creates Traffic Activity Graphs (TAG). The two step model will make use of Machine Learning techniques to generate the required outputs.  
  
 
The bootstrap classification of the two stage model will use a Machine Learning technique to feed in a NetFlow training dataset, and generate predicted flow labels for the Netflow Data.
 
The bootstrap classification of the two stage model will use a Machine Learning technique to feed in a NetFlow training dataset, and generate predicted flow labels for the Netflow Data.

Revision as of 15:39, 7 April 2016

Project Team

Karl Hornlund

Jason Trann

Supervisors

Assoc Prof Cheng Chew Lim

Dr Hong Gunn Chew

Dr Adriel Cheng (DSTG)

Introduction

Project Description:

The project aim is to accurately identify internet applications and detect malicious traffic from NetFlow data. For this project, from the outcomes, several motivations are realised:

- Determining network resource demands within a network.

- Determining the traffic load of the inspected network.

- Identifying applications of interest within the inspected network.

In collaboration with the Defence Science and Technology Group (DSTG) and the University of Adelaide (UofA), a two step model consisting of a bootstrap classification stage and a calibration classification stage will be developed in order to inspect NetFlow data, which identifies internet classes and creates Traffic Activity Graphs (TAG). The two step model will make use of Machine Learning techniques to generate the required outputs.

The bootstrap classification of the two stage model will use a Machine Learning technique to feed in a NetFlow training dataset, and generate predicted flow labels for the Netflow Data.

The calibration classification of the two stage model will use TAGs, the neighbouring predicted flow edges of hosts and Machine Learning Techniques to calibrate edge classifications.

The project will be produced through the software environment: R.