Please use this identifier to cite or link to this item: http://hdl.handle.net/10266/3862
Full metadata record
DC FieldValueLanguage
dc.contributor.supervisorSingh, Maninder-
dc.contributor.authorKaur, Ratinder-
dc.date.accessioned2016-02-25T06:47:35Z-
dc.date.available2016-02-25T06:47:35Z-
dc.date.issued2016-02-25T06:47:35Z-
dc.identifier.urihttp://hdl.handle.net/10266/3862-
dc.descriptionPHD, CSEDen
dc.description.abstractRoot cause of any security loophole on all kinds of networks lies within a developer's realm. As security is not seriously considered in soft- ware development eff ort, more and more vulnerabilities are getting discovered every single day. Software vulnerabilities are of two types: known and unknown. Known vulnerabilities are the one which has been identified and fi xed. On the other hand, unknown vulnerabilities are the one for which there is no prior knowledge of the flaw and therefore, no patch or fix is available for it. These are also known as zero-day vulnerabilities, which are extremely dangerous and unpredictable. Zero-day vulnerabilities provide a backdoor into any operating system or application and represents a serious threat. A cyber attack that targets or exploits zero-day vulnerability(ies) is known as zero-day attack. The major contribution of the thesis is a system called RADAR. RADAR stands for Real-time Zero-day Attack Detection Analysis and Reporting system. RADAR uses a hybrid approach and is capable of detecting zero-day attacks. It does so by identifying benign traffic based on important tra ffic features and creating a baseline to seek unknown deviations. RADAR also implements a stub to analyze zero-day binary in parallel. The analysis and reporting stub integrates existing malware analysis functionalities and utilities in a component based architecture. RADAR demonstrates following main features: (a) Bridging the gap between the detection and analysis phase to deliver the first inclusive behavioral report about a zero-day attack. (b) Combines features of existing zero-day attack detection techniques (anomaly detection, signature-based detection and behavior-based detection) and fi nally offers better sensitivity and speci ficity. (c) It is based on a layered architecture where each layer is dedicated to a single functionality and works in parallel to improve system performance. Detection layer uses machine learning to detect zero-day attacks. Analysis layer combines static and dynamic malware analysis functionality to analyze the captured binary. Step by step manual analysis can also be done to help malware analyst in case of manual intervention is required. Resource layer supports the working of above two layers. (d) Implements a kernel based monitoring to track system objects during dynamic analysis in a reliable way. (e) Generates comprehensive report on zero-day malware behavior in HTML and PDF format. RADAR is implemented and evaluated against various standard IDS evaluation metrics. The results shows high sensitivity and speci ficity. Also in this research work, reports generated by RADAR are com- pared to the information provided by online virus and behavioral scan engines. Results are published to research community in form of peer- reviewed journal and conference publications.en
dc.format.extent3032103 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoenen
dc.subjectNetwork Securityen
dc.subjectIntrusion detectionen
dc.subjectZero-day attacksen
dc.subjectKernel Minifilteren
dc.subjectCSEDen
dc.titleEfficient Zero-day Attacks Detection Techniquesen
dc.typeThesisen
Appears in Collections:Doctoral Theses@CSED

Files in This Item:
File Description SizeFormat 
3862.pdf2.96 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.