The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 4 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Title
Abstract
Introduction:
1. Definition of Terms(Payload) and Explanation.
2. Scope and Limitations
Methods
1. Anomalous Payload based Network Intrusion Detection
a. Unsupervised learning
b. Payload- based anomaly Detector(PAYL)
c. Payload Content based Network Anomaly Detection(PCNAD)
d. Data mining for Anomalous Network Payload Detection.
e. Layered higher order n-grams for hardening payload based anomaly intrusion detection.
2. Payload analysis for Worm content Detection
a. Using Deterministic Finite Automation
b. Polymorphic worm Signatures
3. Payload Caching, TCP Packet payload inspection, Deep packet Inspection, Deep Packet anonymization and Plug-X Payload Extraction.
4. Host Identity Payload in Home Networks.
5. Network Traffic Classification
a. Using (p,n)-grams Packet Representation
b. Using Machine Learning Methods
c. Redundancy in Network Traffic
d. Analysis of Game-Over Zeus Network Traffic.
e. Delayed-Dictionary Compression for Packet Networks
6. Deep Packet Inspection and Anonymization.
7. SABOT(Specification- based Payload Generation for Programmable Logic Controllers)
8. An ideal steganographic scheme in Networks using twisted payloads.
9. Performance analysis of voice call using Skype.
10. ASAP: Automatic Semantics - Aware Analysis of Network Payloads.
11. Ephemeral Feature Presentation of Covert channels in Network Protocols.
12. Maximizing throughput in ZigBee Wireless Networks
Â
Figures and Tables
1. Integrated IDS figure(for Anamalous Payload detection)
2. Tables and graphs depicting Payload modeling and Anomaly detection.
3. Figures representing Deterministic Finite Automation approach for Internet Worm content detection.
4. Figures for Polymorphic Worm Signatures(Architecture)
5. Figures and tables for Payload caching to show data forwarding.
6. Figure for Host Identity Payload Architecture
7. Figures for SABOT
8. Other figures and tables wherever needed.
Note: Figures and tables must be discussed in the methods. They must be in the methods but not drawn separately.
Results and Discussion
Conclusion
References and Citations
Â
Â
Follow same instructions as the last article u worked on for me
Â
Please refer to all the sample papers at the following link for reference. I need you to draw information from the same -Â
https://www.dropbox.com/s/vvc1cugkqz3kb4k/Payload.zip?dl=0
Â
Also see the attached file
Â
1. Network Payload-based Anomaly DetecTon and Content-based Alert CorrelaTon.h±p://www1.cs.columbia.edu/~kewang/paper/Ke-thesis.pdf2. Packet payload monitoring for internet worm detection.h±p://www.hindawi.com/journals/jcnc/2014/206867/3. Anomalous Payload-based Network Intrusion DetecTon.h±p://ids.cs.columbia.edu/sites/default/Fles/RAID4.PD²4.Plug X- Payload ExtracTon.h±p://www.contexTs.com/documents/11/PlugX_-_Payload_ExtracTon_March_2013_1.pdf5. Payload Content based Network Anomaly DetecTon.h±p://cstar.iiit.ac.in/~kkishore/pcnad-icadiwt.pdf6.Payload Caching.h±p://cseweb.ucsd.edu/~kyocum/pubs/pcache.pdf7. Data mining for Anomalous Network Payload DetecTon.h±p://people.e³.unsa.ba/~smrdovic/publicaTons/BIH´EL2006-Mrdovic.pdf8.Analysis of Game-Over Zeus Network ´raµc.h±p://www.sans.org/reading-room/whitepapers/detecTon/analysis-gameover-zeus-network-traµc-357429.Network traµc characterizaTon.h±p://www.covert.io/research-papers/security/Network%20´raµc%20CharacterizaTon%20Using%20(p,%20n)-grams%20Packet%20RepresentaTon.pdf10.´CP packet payload inspecTon.h±p://www.academia.edu/7692234/´CP_packet_payload_inspecTon_on_Net²PGA_Reference_Router11.ImplementaTon of Deep Packet InspecTon(DPI) Internet survelillance.h±p://www.projectpact.eu/privacy-security-research-paper-series/%231_Privacy_and_Security_Research_Paper_Series.pdf12.SABO´(SpeciFcaTon- based Payload GeneraTon for Programmable Logic Controllers.h±p://siis.cse.psu.edu/pubs/NAS-´R-0162-2012.pdf
Attachments:
-----------