SlideShare a Scribd company logo
1 of 3
Download to read offline
Research proposal - Autonomous post
intrusion, network isolation systems
Shaon Diwakar
University of Technology, Sydney
May 2009
Abstract
In an interconnected world, mitigating the risk of data loss as
well as maintaining network and endpoint security, presents both an
opportunity and a cost to businesses. Over the last two decades, sig-
nificant efforts have been made to improve the reliability and security
of networked systems to prevent them from abuse, exploitation and
fraud. As a result, the market has driven a marked improvement in
the sophistication of defensive technologies such as intrusion detec-
tion, intrusion prevention and endpoint security solutions, which are
employed to defend against increasingly complex, offensive network
and application attacks.
Today, as people place an ever-increasing reliance on networked
computer systems, the threat of directed (terrorist activity, corporate
espionage) or secondary attacks (malware/viral infection) has been
very real and to date, amounted to significant financial losses for busi-
nesses and governments worldwide.
This dissertation, will demonstrate the application of neural net-
works, rule-sets and mathematical models pertaining to the detection,
isolation and remediation following network and application security
attacks in IPv4 networks.
1
1 Research aim
This research will focus on three important facets of network security with
four main overarching goals, foremost, an investigation of techniques that
could be employed to prevent comprehensive network infiltration, in the
event of a networked system becoming partially, or completely under the
control of an unauthorised individual or group (cracker, terrorists). The pro-
posed method will investigate various forms of network isolation, automatic
modification of router/switch access controls, changes in firewall state and
modification of user accounts.
Secondly, investigate whether proactive user level auditing through anal-
yses of anomalies in account usage patterns could be used to mitigate the risk
of abuse & fraud in a high-risk environment (e.g. in the banking, intelligence
and health sectors).
Thirdly, provide a model or methodology that can be used in the event
of an intrusion to provide a certain level of network forensics (dates & times
of user account compromises, service misuse or attacks).
And finally, the fourth aim of this master’s thesis is to practically demon-
strate the implementation of the proposed system(s) in a controlled environ-
ment using open source applications or off-the-shelf software.
2 Methodology
This research will involve both in part, an investigation of network isolation
mechanisms and, subsequent quantitative testing of the hypotheses derived.
Such research could be carried out in the following manner:
2
• Literature review of prior, related work in the network security field
(intrusion detection, intrusion prevention and deep packet inspection
technology);
• Mathematical modelling of rule-based & fuzzy logic algorithm(s) that
can be used to determine what constitutes a network compromise;
• Analyses of common scenarios where the proposed model(s) would ac-
tively prevent further network infiltration;
• Development of a software system that demonstrates the value of said
isolation mechanisms.
3 Research plan
This research will be performed over three semesters (1.5 years) as prescribed
for a full-time MSc Computing Science (Research) student. A high-level
schedule for the proposed work is outlined below.
Semester Major deliverable
I Literature review, network isolation process, prototype
software architecture.
II Software development.
III Testing, bug-fixing, neural network spiking, preparation
for academic submission & presentation.
3

More Related Content

What's hot

Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...IEEEGLOBALSOFTSTUDENTPROJECTS
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)ijfcst journal
 

What's hot (16)

Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Integrated security analysis on casc...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 

Viewers also liked

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
 
PTE introduction
PTE introductionPTE introduction
PTE introductionPTESOL
 
Effective use of internet & computer for Academic Research | by SIDDHADREAMS
Effective use of internet & computer for Academic Research | by SIDDHADREAMSEffective use of internet & computer for Academic Research | by SIDDHADREAMS
Effective use of internet & computer for Academic Research | by SIDDHADREAMSsiddhadreams
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
 
Curriculum models long
Curriculum models longCurriculum models long
Curriculum models longdahleehiggs
 
Meaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nuladaMeaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nuladarajnulada
 
Educational Supervision and its types
Educational Supervision and its typesEducational Supervision and its types
Educational Supervision and its typesNeena Khala
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in EducationAllana Delgado
 
Models of curriculum
Models of curriculumModels of curriculum
Models of curriculumj_allsopp
 
Curriculum its meaning, nature and scope
Curriculum   its meaning, nature and scopeCurriculum   its meaning, nature and scope
Curriculum its meaning, nature and scopevalarpink
 

Viewers also liked (10)

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
 
PTE introduction
PTE introductionPTE introduction
PTE introduction
 
Effective use of internet & computer for Academic Research | by SIDDHADREAMS
Effective use of internet & computer for Academic Research | by SIDDHADREAMSEffective use of internet & computer for Academic Research | by SIDDHADREAMS
Effective use of internet & computer for Academic Research | by SIDDHADREAMS
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
 
Curriculum models long
Curriculum models longCurriculum models long
Curriculum models long
 
Meaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nuladaMeaning, scope and function of supervision by raemmil f. nulada
Meaning, scope and function of supervision by raemmil f. nulada
 
Educational Supervision and its types
Educational Supervision and its typesEducational Supervision and its types
Educational Supervision and its types
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
 
Models of curriculum
Models of curriculumModels of curriculum
Models of curriculum
 
Curriculum its meaning, nature and scope
Curriculum   its meaning, nature and scopeCurriculum   its meaning, nature and scope
Curriculum its meaning, nature and scope
 

Similar to MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar

Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...IAESIJAI
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxinfantsuk
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSDaphne Smith
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...IRJET Journal
 
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...Konstantinos Demertzis
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueIRJET Journal
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
Traffic anomaly diagnosis in internet backbone networks
Traffic anomaly diagnosis in internet backbone networksTraffic anomaly diagnosis in internet backbone networks
Traffic anomaly diagnosis in internet backbone networksSabri Balafif
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network IJECEIAES
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 

Similar to MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar (20)

Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
N018138696
N018138696N018138696
N018138696
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docx
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
The Next Generation Cognitive Security Operations Center: Adaptive Analytic L...
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
Traffic anomaly diagnosis in internet backbone networks
Traffic anomaly diagnosis in internet backbone networksTraffic anomaly diagnosis in internet backbone networks
Traffic anomaly diagnosis in internet backbone networks
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 

Recently uploaded

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 

Recently uploaded (20)

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar

  • 1. Research proposal - Autonomous post intrusion, network isolation systems Shaon Diwakar University of Technology, Sydney May 2009 Abstract In an interconnected world, mitigating the risk of data loss as well as maintaining network and endpoint security, presents both an opportunity and a cost to businesses. Over the last two decades, sig- nificant efforts have been made to improve the reliability and security of networked systems to prevent them from abuse, exploitation and fraud. As a result, the market has driven a marked improvement in the sophistication of defensive technologies such as intrusion detec- tion, intrusion prevention and endpoint security solutions, which are employed to defend against increasingly complex, offensive network and application attacks. Today, as people place an ever-increasing reliance on networked computer systems, the threat of directed (terrorist activity, corporate espionage) or secondary attacks (malware/viral infection) has been very real and to date, amounted to significant financial losses for busi- nesses and governments worldwide. This dissertation, will demonstrate the application of neural net- works, rule-sets and mathematical models pertaining to the detection, isolation and remediation following network and application security attacks in IPv4 networks. 1
  • 2. 1 Research aim This research will focus on three important facets of network security with four main overarching goals, foremost, an investigation of techniques that could be employed to prevent comprehensive network infiltration, in the event of a networked system becoming partially, or completely under the control of an unauthorised individual or group (cracker, terrorists). The pro- posed method will investigate various forms of network isolation, automatic modification of router/switch access controls, changes in firewall state and modification of user accounts. Secondly, investigate whether proactive user level auditing through anal- yses of anomalies in account usage patterns could be used to mitigate the risk of abuse & fraud in a high-risk environment (e.g. in the banking, intelligence and health sectors). Thirdly, provide a model or methodology that can be used in the event of an intrusion to provide a certain level of network forensics (dates & times of user account compromises, service misuse or attacks). And finally, the fourth aim of this master’s thesis is to practically demon- strate the implementation of the proposed system(s) in a controlled environ- ment using open source applications or off-the-shelf software. 2 Methodology This research will involve both in part, an investigation of network isolation mechanisms and, subsequent quantitative testing of the hypotheses derived. Such research could be carried out in the following manner: 2
  • 3. • Literature review of prior, related work in the network security field (intrusion detection, intrusion prevention and deep packet inspection technology); • Mathematical modelling of rule-based & fuzzy logic algorithm(s) that can be used to determine what constitutes a network compromise; • Analyses of common scenarios where the proposed model(s) would ac- tively prevent further network infiltration; • Development of a software system that demonstrates the value of said isolation mechanisms. 3 Research plan This research will be performed over three semesters (1.5 years) as prescribed for a full-time MSc Computing Science (Research) student. A high-level schedule for the proposed work is outlined below. Semester Major deliverable I Literature review, network isolation process, prototype software architecture. II Software development. III Testing, bug-fixing, neural network spiking, preparation for academic submission & presentation. 3