Please use this identifier to cite or link to this item: http://repository.aaup.edu/jspui/handle/123456789/3140
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJaber, Bashar Sadi Mustafa$AAUP$Palestinian-
dc.date.accessioned2025-02-06T08:47:41Z-
dc.date.available2025-02-06T08:47:41Z-
dc.date.issued2024-
dc.identifier.urihttp://repository.aaup.edu/jspui/handle/123456789/3140-
dc.descriptionMaster \ Cybercrimes and Digital Evidence Analysisen_US
dc.description.abstractIn the current digital environment, detecting malicious activities within network traffic has become paramount for ensuring cybersecurity. This thesis introduced the Normal Traffic Detection (NTD) model, which differentiates between normal and abnormal IP address traffic. Drawing upon the collaborative strengths of Support Vector Machines (SVM), Sequential Artificial Neural Networks (ANN), and Decision Trees, it stands for Network Traffic as a beacon of innovation in anomaly detection. The methodology of the NTD model lies in its sophisticated approach to analyzing incoming traffic data. Initial scrutiny involves capturing and analyzing the nuances of the traffic, with particular emphasis on behavior. This data is scrutinized meticulously against an Anomaly Behavior Database (ABD), a repository teeming with previously identified aberrations in network behavior. Any matches with entries within the ABD are promptly flagged as malicious, warranting further investigation. However, not all traffic bears the hallmark of known anomalies. For those instances that evade identification within the ABD, NTD embarks on a journey of sequential classification. The traffic is subjected to the discerning scrutiny of SVM, Decision Trees, and ANN, each algorithm meticulously parsing through the data in pursuit of anomalous patterns. Upon detection of malicious intent, the traffic is promptly logged into the ABD, enriching its repository with newfound insights. The efficacy of NTD transcends mere theoretical conjecture; empirical validation using real-world cybersecurity datasets serves as a litmus test for its prowess. Comparative analyses against traditional single-algorithm methods reveal a resounding victory for NTD, boasting superior metrics. Whether measured by the F1 score, precision, or recall, NTD emerges as the undisputed champion, heralding a new era in network traffic anomaly detection. Beyond its immediate applications in cybersecurity, NTD's implications extend far and wide. Its robust performance underscores its potential to fortify defenses across various domains, from financial institutions safeguarding sensitive transactions to governmental agencies protecting critical infrastructure. The ripple effects of NTD's deployment resonate throughout the digital ecosystem, engendering a newfound sense of confidence in the face of ever evolving cyber threaten_US
dc.publisherAAUPen_US
dc.subjectNetwork Traffic Detection (NTD), Anomaly Detection, Support Vector Machines (SVM), Machine Learning, Cybersecurity.en_US
dc.titleDetecting and Permitting Legitimate Traffic from IPs with Malicious Reputation رسالة ماجستيرen_US
dc.title.alternativeكشف الحركة المشروعة من عناوين ال IP ذات السمعة الضارة والسماح بها.en_US
dc.typeThesisen_US
Appears in Collections:Master Theses and Ph.D. Dissertations

Files in This Item:
File Description SizeFormat 
بشار جبر.pdf2.01 MBAdobe PDFThumbnail
View/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Admin Tools