Show simple item record

dc.contributor.advisorAbel Sanchez.en_US
dc.contributor.authorMoe, Lwin Pen_US
dc.contributor.otherMassachusetts Institute of Technology. Integrated Design and Management Program.en_US
dc.date.accessioned2018-10-15T20:24:14Z
dc.date.available2018-10-15T20:24:14Z
dc.date.copyright2018en_US
dc.date.issued2018en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/118536
dc.descriptionThesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 84-86).en_US
dc.description.abstractCybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.en_US
dc.description.statementofresponsibilityby Lwin P. Moe.en_US
dc.format.extent86 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectEngineering and Management Program.en_US
dc.subjectIntegrated Design and Management Program.en_US
dc.titleCyber security risk analysis framework : network traffic anomaly detectionen_US
dc.typeThesisen_US
dc.description.degreeS.M. in Engineering and Managementen_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering and Management Programen_US
dc.contributor.departmentMassachusetts Institute of Technology. Integrated Design and Management Program.en_US
dc.identifier.oclc1054927618en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record