SlideShare a Scribd company logo
1 of 3
Download to read offline
Research proposal - Autonomous post
intrusion, network isolation systems
Shaon Diwakar
University of Technology, Sydney
May 2009
Abstract
In an interconnected world, mitigating the risk of data loss as
well as maintaining network and endpoint security, presents both an
opportunity and a cost to businesses. Over the last two decades, sig-
nificant efforts have been made to improve the reliability and security
of networked systems to prevent them from abuse, exploitation and
fraud. As a result, the market has driven a marked improvement in
the sophistication of defensive technologies such as intrusion detec-
tion, intrusion prevention and endpoint security solutions, which are
employed to defend against increasingly complex, offensive network
and application attacks.
Today, as people place an ever-increasing reliance on networked
computer systems, the threat of directed (terrorist activity, corporate
espionage) or secondary attacks (malware/viral infection) has been
very real and to date, amounted to significant financial losses for busi-
nesses and governments worldwide.
This dissertation, will demonstrate the application of neural net-
works, rule-sets and mathematical models pertaining to the detection,
isolation and remediation following network and application security
attacks in IPv4 networks.
1
1 Research aim
This research will focus on three important facets of network security with
four main overarching goals, foremost, an investigation of techniques that
could be employed to prevent comprehensive network infiltration, in the
event of a networked system becoming partially, or completely under the
control of an unauthorised individual or group (cracker, terrorists). The pro-
posed method will investigate various forms of network isolation, automatic
modification of router/switch access controls, changes in firewall state and
modification of user accounts.
Secondly, investigate whether proactive user level auditing through anal-
yses of anomalies in account usage patterns could be used to mitigate the risk
of abuse & fraud in a high-risk environment (e.g. in the banking, intelligence
and health sectors).
Thirdly, provide a model or methodology that can be used in the event
of an intrusion to provide a certain level of network forensics (dates & times
of user account compromises, service misuse or attacks).
And finally, the fourth aim of this master’s thesis is to practically demon-
strate the implementation of the proposed system(s) in a controlled environ-
ment using open source applications or off-the-shelf software.
2 Methodology
This research will involve both in part, an investigation of network isolation
mechanisms and, subsequent quantitative testing of the hypotheses derived.
Such research could be carried out in the following manner:
2
• Literature review of prior, related work in the network security field
(intrusion detection, intrusion prevention and deep packet inspection
technology);
• Mathematical modelling of rule-based & fuzzy logic algorithm(s) that
can be used to determine what constitutes a network compromise;
• Analyses of common scenarios where the proposed model(s) would ac-
tively prevent further network infiltration;
• Development of a software system that demonstrates the value of said
isolation mechanisms.
3 Research plan
This research will be performed over three semesters (1.5 years) as prescribed
for a full-time MSc Computing Science (Research) student. A high-level
schedule for the proposed work is outlined below.
Semester Major deliverable
I Literature review, network isolation process, prototype
software architecture.
II Software development.
III Testing, bug-fixing, neural network spiking, preparation
for academic submission & presentation.
3

More Related Content

What's hot

What's hot (16)

Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 

Viewers also liked

Curriculum models long
Curriculum models longCurriculum models long
Curriculum models long
dahleehiggs
 
Meaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nuladaMeaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nulada
rajnulada
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
Allana Delgado
 
Models of curriculum
Models of curriculumModels of curriculum
Models of curriculum
j_allsopp
 

Viewers also liked (10)

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
 
PTE introduction
PTE introductionPTE introduction
PTE introduction
 
Effective use of internet & computer for Academic Research | by SIDDHADREAMS
Effective use of internet & computer for Academic Research | by SIDDHADREAMSEffective use of internet & computer for Academic Research | by SIDDHADREAMS
Effective use of internet & computer for Academic Research | by SIDDHADREAMS
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
 
Curriculum models long
Curriculum models longCurriculum models long
Curriculum models long
 
Meaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nuladaMeaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nulada
 
Educational Supervision and its types
Educational Supervision and its typesEducational Supervision and its types
Educational Supervision and its types
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
 
Models of curriculum
Models of curriculumModels of curriculum
Models of curriculum
 
Curriculum its meaning, nature and scope
Curriculum   its meaning, nature and scopeCurriculum   its meaning, nature and scope
Curriculum its meaning, nature and scope
 

Similar to MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar

Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
IJMER
 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docx
infantsuk
 
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
Konstantinos Demertzis
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 

Similar to MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar (20)

Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
N018138696
N018138696N018138696
N018138696
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docx
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
Traffic anomaly diagnosis in internet backbone networks
Traffic anomaly diagnosis in internet backbone networksTraffic anomaly diagnosis in internet backbone networks
Traffic anomaly diagnosis in internet backbone networks
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar

  • 1. Research proposal - Autonomous post intrusion, network isolation systems Shaon Diwakar University of Technology, Sydney May 2009 Abstract In an interconnected world, mitigating the risk of data loss as well as maintaining network and endpoint security, presents both an opportunity and a cost to businesses. Over the last two decades, sig- nificant efforts have been made to improve the reliability and security of networked systems to prevent them from abuse, exploitation and fraud. As a result, the market has driven a marked improvement in the sophistication of defensive technologies such as intrusion detec- tion, intrusion prevention and endpoint security solutions, which are employed to defend against increasingly complex, offensive network and application attacks. Today, as people place an ever-increasing reliance on networked computer systems, the threat of directed (terrorist activity, corporate espionage) or secondary attacks (malware/viral infection) has been very real and to date, amounted to significant financial losses for busi- nesses and governments worldwide. This dissertation, will demonstrate the application of neural net- works, rule-sets and mathematical models pertaining to the detection, isolation and remediation following network and application security attacks in IPv4 networks. 1
  • 2. 1 Research aim This research will focus on three important facets of network security with four main overarching goals, foremost, an investigation of techniques that could be employed to prevent comprehensive network infiltration, in the event of a networked system becoming partially, or completely under the control of an unauthorised individual or group (cracker, terrorists). The pro- posed method will investigate various forms of network isolation, automatic modification of router/switch access controls, changes in firewall state and modification of user accounts. Secondly, investigate whether proactive user level auditing through anal- yses of anomalies in account usage patterns could be used to mitigate the risk of abuse & fraud in a high-risk environment (e.g. in the banking, intelligence and health sectors). Thirdly, provide a model or methodology that can be used in the event of an intrusion to provide a certain level of network forensics (dates & times of user account compromises, service misuse or attacks). And finally, the fourth aim of this master’s thesis is to practically demon- strate the implementation of the proposed system(s) in a controlled environ- ment using open source applications or off-the-shelf software. 2 Methodology This research will involve both in part, an investigation of network isolation mechanisms and, subsequent quantitative testing of the hypotheses derived. Such research could be carried out in the following manner: 2
  • 3. • Literature review of prior, related work in the network security field (intrusion detection, intrusion prevention and deep packet inspection technology); • Mathematical modelling of rule-based & fuzzy logic algorithm(s) that can be used to determine what constitutes a network compromise; • Analyses of common scenarios where the proposed model(s) would ac- tively prevent further network infiltration; • Development of a software system that demonstrates the value of said isolation mechanisms. 3 Research plan This research will be performed over three semesters (1.5 years) as prescribed for a full-time MSc Computing Science (Research) student. A high-level schedule for the proposed work is outlined below. Semester Major deliverable I Literature review, network isolation process, prototype software architecture. II Software development. III Testing, bug-fixing, neural network spiking, preparation for academic submission & presentation. 3