SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
1
Assoc.Prof. Panita Wannapiroon,
Ph.D.
Preecha Pangsuban
Ph.D. Candidate
Assoc.Prof. Prachyanun Nilsook,
Ph.D.
2
INTRODUCTION
ICT has become a daily routine.
3
INTRODUCTION (cont.)
Cyber attacks
4
INTRODUCTION (cont.)
AI and ML used for vulnerability detection and data processing
5
The attacker can use ML to support his attacks at the same time
INTRODUCTION (cont.)
6
The Direct effects such as, reduction in work efficiency,
add recovery times having damage cost.
INTRODUCTION (cont.)
7
Indirect effects includes loss of business and non-credible organizations
INTRODUCTION (cont.)
8
Information system should have a security risk assessment to prepare for threats,
analyze the risks involved and preventive measures
INTRODUCTION (cont.)
9
Risk assessment (RA) includes, risk identification, risk analysis, and risk
priority.
INTRODUCTION (cont.)
10
Risk assessment based on the
likelihood of the occurrence
and the severity of the impact
of attacks
INTRODUCTION (cont.)
11
CICIDS2017 dataset was used in this research for threat detection and vulnerability
INTRODUCTION (cont.)
12
RESULT (cont.)
CICIDS2017 dataset have a variety of ways to detect Denial of Service,
Password attack, Probing and vulnerability
No Group of Intrusion Type of Intrusion
1 Normal Benign
2 Denial of Service: Dos Botnet, DDoS, DoS GoldenEye, DoS Hulk, DoS
Slowhttp, DoS Slowloris
3 Password attacks FTP-Patator, SSH-Patator, Web-Attack-Brute-Force
4 Probing Port Scan
5 Vulnerability Heartbleed Attack, Infiltration, Web-Attack-Sql-
Injection, Web-Attack-XSS
13
INTRODUCTION
Example of CICIDS2017 dataset
INTRODUCTION (cont.)
14
INTRODUCTION (cont.)
• Using CICIDS2017 dataset to create predictive models by ML
for predicting the likelihood of attacks
• The impact is assessed by the severity of each type of attacks.
• Risk assessment is the result of the likelihood and impact that
has occurred as a risk matrix of information systems.
15
To study the concept of RA for information system with CICIDS 2017
dataset using ML.
1
2
To design architecture of RA for information system with CICIDS
2017 dataset using ML.
1
OBJECTIVES OF THE RESEARCH
2
16
To study information and related research about RA on information system
based on intrusion network with ML and analyzed data for concept design.
1
To develop the components of RA system from the concept.2
To design architecture of RA system from the concept.3
1
2
3
RESEARCH OPERATION
17
RESULT
The conceptual framework
18
System components
RESULT (cont.)
19
System Architecture
RESULT (cont.)
20
RESULT (cont.)
The risk matrix report form
21
CONCLUSIONS
The system architecture consist of three main sections; network data
capture, risk predictive analysis and Risk Assessment report.
It is designed to work in real time, the network data capture design
need a special Network Interface Card that high efficiency and speed
to be able to capture data into “pcap” form
The network data converted to CICIDS2017 dataset form and they
are predicted intrusion by ML and stored into the data file
Logstash and Elasticsearch works together for handling and searching
big log files to increase the number of servers
22
CONCLUSIONS (cont.)
ML to identify known threats and suspicious behavior, by using
faster time helps reduce some mistakes caused by false positive and
false negative.
ML can identify threats, which can be clearly divided according to
the type of intrusion and can also specify the time of the intrusion in
real time.
The system can monitor RA and warn the system administrator for
prevention of risk of information system and harm reduction.
It is a tool used at work by institutions.
Any Question
23
CONTACT
24
E-mail :
preecha@yru.ac.th
Facebook :
www.facebook.com/ppbyru
Thank
YouPRESENTED BY : Preecha Pangsuban
A Real-time Risk Assessment for Information System
with CICIDS2017 dataset using Machine Learning
25

Contenu connexe

Tendances

What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...
What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...
What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...
Simplilearn
 
Meetup: Streaming Data Pipeline Development
Meetup:  Streaming Data Pipeline DevelopmentMeetup:  Streaming Data Pipeline Development
Meetup: Streaming Data Pipeline Development
Timothy Spann
 

Tendances (20)

Scaling Data Quality @ Netflix
Scaling Data Quality @ NetflixScaling Data Quality @ Netflix
Scaling Data Quality @ Netflix
 
Data Engineering Basics
Data Engineering BasicsData Engineering Basics
Data Engineering Basics
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...
What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...
What Is Apache Spark? | Introduction To Apache Spark | Apache Spark Tutorial ...
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Continuous Application with FAIR Scheduler with Robert Xue
Continuous Application with FAIR Scheduler with Robert XueContinuous Application with FAIR Scheduler with Robert Xue
Continuous Application with FAIR Scheduler with Robert Xue
 
Meetup: Streaming Data Pipeline Development
Meetup:  Streaming Data Pipeline DevelopmentMeetup:  Streaming Data Pipeline Development
Meetup: Streaming Data Pipeline Development
 
Death of the Dashboard
Death of the DashboardDeath of the Dashboard
Death of the Dashboard
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Amazon Aurora
Amazon AuroraAmazon Aurora
Amazon Aurora
 
Oracle RAC - New Generation
Oracle RAC - New GenerationOracle RAC - New Generation
Oracle RAC - New Generation
 
Data Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesData Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & Approaches
 
Introducing Databricks Delta
Introducing Databricks DeltaIntroducing Databricks Delta
Introducing Databricks Delta
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Hive, Presto, and Spark on TPC-DS benchmark
Hive, Presto, and Spark on TPC-DS benchmarkHive, Presto, and Spark on TPC-DS benchmark
Hive, Presto, and Spark on TPC-DS benchmark
 

Similaire à A Real-time Risk Assessment for Information System with CICIDS2017 dataset using Machine Learning

Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Petar Radanliev
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
IJCSIS Research Publications
 
Machine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacksMachine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacks
IAESIJAI
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 

Similaire à A Real-time Risk Assessment for Information System with CICIDS2017 dataset using Machine Learning (20)

Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
Machine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacksMachine learning-based intrusion detection system for detecting web attacks
Machine learning-based intrusion detection system for detecting web attacks
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 

Plus de Prachyanun Nilsook

เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.
เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.
เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.
Prachyanun Nilsook
 
การจัดการเรียนการสอนอาชีวศึกษา2
การจัดการเรียนการสอนอาชีวศึกษา2การจัดการเรียนการสอนอาชีวศึกษา2
การจัดการเรียนการสอนอาชีวศึกษา2
Prachyanun Nilsook
 
การจัดการเรียนการสอนอาชีวศึกษา1
การจัดการเรียนการสอนอาชีวศึกษา1การจัดการเรียนการสอนอาชีวศึกษา1
การจัดการเรียนการสอนอาชีวศึกษา1
Prachyanun Nilsook
 

Plus de Prachyanun Nilsook (20)

Generative Artificial Intelligence for Imagineering in education
Generative Artificial Intelligence for Imagineering in educationGenerative Artificial Intelligence for Imagineering in education
Generative Artificial Intelligence for Imagineering in education
 
3.เทคนิคการเขียนบทความระดับนานาชาติ_2566_12.pdf
3.เทคนิคการเขียนบทความระดับนานาชาติ_2566_12.pdf3.เทคนิคการเขียนบทความระดับนานาชาติ_2566_12.pdf
3.เทคนิคการเขียนบทความระดับนานาชาติ_2566_12.pdf
 
เทคนิคการเขียนบทความระดับนานาชาติ_2566_10.pdf
เทคนิคการเขียนบทความระดับนานาชาติ_2566_10.pdfเทคนิคการเขียนบทความระดับนานาชาติ_2566_10.pdf
เทคนิคการเขียนบทความระดับนานาชาติ_2566_10.pdf
 
บทบาทของวิชาชีพเทคโนโลยีและสื่อสารการศึกษา
บทบาทของวิชาชีพเทคโนโลยีและสื่อสารการศึกษาบทบาทของวิชาชีพเทคโนโลยีและสื่อสารการศึกษา
บทบาทของวิชาชีพเทคโนโลยีและสื่อสารการศึกษา
 
ระบบธนาคารสะสมหน่วยกิต
ระบบธนาคารสะสมหน่วยกิตระบบธนาคารสะสมหน่วยกิต
ระบบธนาคารสะสมหน่วยกิต
 
Instructional Design for Next Normal Education
Instructional Design for Next Normal EducationInstructional Design for Next Normal Education
Instructional Design for Next Normal Education
 
BCG Model
BCG ModelBCG Model
BCG Model
 
คู่มือการจัดทําแผนการจัดการเรียนรู้มุ่งสมรรถนะ.pdf
คู่มือการจัดทําแผนการจัดการเรียนรู้มุ่งสมรรถนะ.pdfคู่มือการจัดทําแผนการจัดการเรียนรู้มุ่งสมรรถนะ.pdf
คู่มือการจัดทําแผนการจัดการเรียนรู้มุ่งสมรรถนะ.pdf
 
แนวทางการจัดการเรียนรู้แบบโครงงานเป็นฐาน-สอศ.2559.pdf
แนวทางการจัดการเรียนรู้แบบโครงงานเป็นฐาน-สอศ.2559.pdfแนวทางการจัดการเรียนรู้แบบโครงงานเป็นฐาน-สอศ.2559.pdf
แนวทางการจัดการเรียนรู้แบบโครงงานเป็นฐาน-สอศ.2559.pdf
 
เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.
เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.
เทคนิคการเขียนโครงการวิจัยและนวัตกรรมให้ได้ทุนวิจัยจากสำนักงาน วช.
 
เทคนิคการเขียนเอกสารประกอบการสอน
เทคนิคการเขียนเอกสารประกอบการสอนเทคนิคการเขียนเอกสารประกอบการสอน
เทคนิคการเขียนเอกสารประกอบการสอน
 
การเขียนเอกสารประกอบการสอน
การเขียนเอกสารประกอบการสอนการเขียนเอกสารประกอบการสอน
การเขียนเอกสารประกอบการสอน
 
Digital leadership 2022
Digital leadership 2022Digital leadership 2022
Digital leadership 2022
 
กระบวนการร่างบทความวิจัยในวารสารระดับนานาชาติด้านคอมพิวเตอร์
กระบวนการร่างบทความวิจัยในวารสารระดับนานาชาติด้านคอมพิวเตอร์กระบวนการร่างบทความวิจัยในวารสารระดับนานาชาติด้านคอมพิวเตอร์
กระบวนการร่างบทความวิจัยในวารสารระดับนานาชาติด้านคอมพิวเตอร์
 
Online education innovation_new_normal_2022
Online education innovation_new_normal_2022Online education innovation_new_normal_2022
Online education innovation_new_normal_2022
 
การจัดการเรียนการสอนอาชีวศึกษา2
การจัดการเรียนการสอนอาชีวศึกษา2การจัดการเรียนการสอนอาชีวศึกษา2
การจัดการเรียนการสอนอาชีวศึกษา2
 
การจัดการเรียนการสอนอาชีวศึกษา1
การจัดการเรียนการสอนอาชีวศึกษา1การจัดการเรียนการสอนอาชีวศึกษา1
การจัดการเรียนการสอนอาชีวศึกษา1
 
การทำผลงานทางวิชาการ เกณฑ์และการขอกำหนดตำแหน่งทางวิชาการ
การทำผลงานทางวิชาการ  เกณฑ์และการขอกำหนดตำแหน่งทางวิชาการการทำผลงานทางวิชาการ  เกณฑ์และการขอกำหนดตำแหน่งทางวิชาการ
การทำผลงานทางวิชาการ เกณฑ์และการขอกำหนดตำแหน่งทางวิชาการ
 
Digital transformation
Digital transformation Digital transformation
Digital transformation
 
แนวทางการตีพิมพ์บทความวิจัยระดับนานาชาติ
แนวทางการตีพิมพ์บทความวิจัยระดับนานาชาติ แนวทางการตีพิมพ์บทความวิจัยระดับนานาชาติ
แนวทางการตีพิมพ์บทความวิจัยระดับนานาชาติ
 

Dernier

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

A Real-time Risk Assessment for Information System with CICIDS2017 dataset using Machine Learning

  • 1. 1 Assoc.Prof. Panita Wannapiroon, Ph.D. Preecha Pangsuban Ph.D. Candidate Assoc.Prof. Prachyanun Nilsook, Ph.D.
  • 2. 2 INTRODUCTION ICT has become a daily routine.
  • 4. 4 INTRODUCTION (cont.) AI and ML used for vulnerability detection and data processing
  • 5. 5 The attacker can use ML to support his attacks at the same time INTRODUCTION (cont.)
  • 6. 6 The Direct effects such as, reduction in work efficiency, add recovery times having damage cost. INTRODUCTION (cont.)
  • 7. 7 Indirect effects includes loss of business and non-credible organizations INTRODUCTION (cont.)
  • 8. 8 Information system should have a security risk assessment to prepare for threats, analyze the risks involved and preventive measures INTRODUCTION (cont.)
  • 9. 9 Risk assessment (RA) includes, risk identification, risk analysis, and risk priority. INTRODUCTION (cont.)
  • 10. 10 Risk assessment based on the likelihood of the occurrence and the severity of the impact of attacks INTRODUCTION (cont.)
  • 11. 11 CICIDS2017 dataset was used in this research for threat detection and vulnerability INTRODUCTION (cont.)
  • 12. 12 RESULT (cont.) CICIDS2017 dataset have a variety of ways to detect Denial of Service, Password attack, Probing and vulnerability No Group of Intrusion Type of Intrusion 1 Normal Benign 2 Denial of Service: Dos Botnet, DDoS, DoS GoldenEye, DoS Hulk, DoS Slowhttp, DoS Slowloris 3 Password attacks FTP-Patator, SSH-Patator, Web-Attack-Brute-Force 4 Probing Port Scan 5 Vulnerability Heartbleed Attack, Infiltration, Web-Attack-Sql- Injection, Web-Attack-XSS
  • 13. 13 INTRODUCTION Example of CICIDS2017 dataset INTRODUCTION (cont.)
  • 14. 14 INTRODUCTION (cont.) • Using CICIDS2017 dataset to create predictive models by ML for predicting the likelihood of attacks • The impact is assessed by the severity of each type of attacks. • Risk assessment is the result of the likelihood and impact that has occurred as a risk matrix of information systems.
  • 15. 15 To study the concept of RA for information system with CICIDS 2017 dataset using ML. 1 2 To design architecture of RA for information system with CICIDS 2017 dataset using ML. 1 OBJECTIVES OF THE RESEARCH 2
  • 16. 16 To study information and related research about RA on information system based on intrusion network with ML and analyzed data for concept design. 1 To develop the components of RA system from the concept.2 To design architecture of RA system from the concept.3 1 2 3 RESEARCH OPERATION
  • 20. 20 RESULT (cont.) The risk matrix report form
  • 21. 21 CONCLUSIONS The system architecture consist of three main sections; network data capture, risk predictive analysis and Risk Assessment report. It is designed to work in real time, the network data capture design need a special Network Interface Card that high efficiency and speed to be able to capture data into “pcap” form The network data converted to CICIDS2017 dataset form and they are predicted intrusion by ML and stored into the data file Logstash and Elasticsearch works together for handling and searching big log files to increase the number of servers
  • 22. 22 CONCLUSIONS (cont.) ML to identify known threats and suspicious behavior, by using faster time helps reduce some mistakes caused by false positive and false negative. ML can identify threats, which can be clearly divided according to the type of intrusion and can also specify the time of the intrusion in real time. The system can monitor RA and warn the system administrator for prevention of risk of information system and harm reduction. It is a tool used at work by institutions.
  • 25. Thank YouPRESENTED BY : Preecha Pangsuban A Real-time Risk Assessment for Information System with CICIDS2017 dataset using Machine Learning 25