Change search
ReferencesLink to record
Permanent link

Direct link
Big data analytics attack detection for Critical Information Infrastructure Protection
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
2016 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Attacks on critical information infrastructure are increasing in volume and sophistication with destructive consequences according to the 2015 Cyber Supply Chain Security Revisited report from ESG recently (ESG, 2015). In a world of connectivity and data dependency, cyber-crime is on the rise causing many disruptions in our way of living. Our society relies on these critical information infrastructures for our social and economic well-being, and become more complex due to many integrated systems.

Over the past years, various research contributions have been made to provide intrusion detection solutions to address these complex attack problems. Even though various research attempts have been made, shortcomings still exists in these solutions to provide attack detection. False positives and false negatives outcomes for attack detection are still known shortcomings that must be addressed.

This study contributes research, by finding a solution for the found shortcomings by designing an IT artifact framework based on the Design Science Research Methodology (DSRM). The framework consist of big data analytics technology that provides attack detection.

Research outcomes for this study shows a possible solution to the shortcomings by the designed IT artifact framework with use of big data analytics technology. The framework built on open source technology can provide attack detection, and possibly provide a solution to improve the false positives and false negatives for attack detection outcomes. Three main modules have been designed and demonstrated, whereby a hybrid approach for detection is used to address the shortcomings. Therefore, this research can benefit Critical Information Infrastructure Protection (CIIP) in Sweden to detect attacks and can possibly be utilized in various network infrastructures.

Place, publisher, year, edition, pages
2016. , 64 p.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:ltu:diva-59562OAI: oai:DiVA.org:ltu-59562DiVA: diva2:1033470
Educational program
Information Security, master's level
Supervisors
Examiners
Available from: 2016-11-03 Created: 2016-10-06 Last updated: 2016-11-03Bibliographically approved

Open Access in DiVA

fulltext(1768 kB)39 downloads
File information
File name FULLTEXT02.pdfFile size 1768 kBChecksum SHA-512
11b3ba67b9d935dfbe2101f334f55208953c04017396d4008415c2074d5c0ee510e9aefe5dfdc534445906f4d27a3e427251002997952eeeb55adb74dd2f8432
Type fulltextMimetype application/pdf

By organisation
Computer Science
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 39 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 80 hits
ReferencesLink to record
Permanent link

Direct link