研究目的
To teach network traffic anomaly detection methods to electrical engineering students using real IP darkspace data, enabling them to gain hands-on experience in detecting and analyzing network attacks.
研究成果
The NetSec-I lab successfully teaches network traffic anomaly detection methods to electrical engineering students using real IP darkspace data. Students gain technical and problem-solving skills, and the lab fosters interest in scientific research. The exercises and data are publicly available for use by other instructors.
研究不足
The lab requires students to have basic knowledge of IP networks and experience with MATLAB and shell scripting. The darkspace data does not include bidirectional conversations, limiting the scope of analysis to attack attempts.
1:Experimental Design and Method Selection:
The lab uses real network traffic from a large IP darkspace monitor for anomaly detection. Students work in pairs to analyze the data using statistical and data mining techniques.
2:Sample Selection and Data Sources:
Data is captured from a /8 network darkspace monitor at UCSD, containing traffic from various network attacks.
3:List of Experimental Equipment and Materials:
Software tools include tcpdump, corsaro, MATLAB, and RapidMiner for data analysis.
4:Experimental Procedures and Operational Workflow:
Students perform exercises to familiarize themselves with data formats, aggregate data for analysis, and apply statistical and data mining techniques to detect anomalies.
5:Data Analysis Methods:
Students use statistical analysis, fast Fourier transformation (FFT), and machine learning techniques to analyze the data.
独家科研数据包,助您复现前沿成果,加速创新突破
获取完整内容