12-12-2012, 06:47 PM
Projects in Network Security with Microsoft Security Experts
Network Security.pdf (Size: 238.22 KB / Downloads: 89)
Goals
Describe the concepts and challenges of anomaly detection
Design and implement an anomaly-based detection system that reads a network log file as an
input and identifies suspicious (potentially compromised) machines
Requirements
In this project students will be required to get familiar and implement anomaly detection techniques
based on large amount of network traffic.
1) Conduct a short literature survey about anomaly detection in network traffic
2) Implement and evaluate these techniques using a log of network traffic
3) Enhance known techniques and check their effectiveness on new network logs
4) Identify the compromised machines presented in the log file
5) Write a concise and self-contained report about the techniques and findings
6) Present the techniques and findings in a conference-like presentation