Técnicas de machine learning para detección de intrusos en redes
Visualitza/Obre
memoria.pdf (1,513Mb) (Accés restringit)
Sol·licita una còpia a l'autor
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Estadístiques de LA Referencia / Recolecta
Inclou dades d'ús des de 2022
Cita com:
hdl:2117/349634
Correu electrònic de l'autorsheila_donosohotmail.com
Tipus de documentTreball Final de Grau
Data2021-07-15
Condicions d'accésAccés restringit per decisió de l'autor
Tots els drets reservats. Aquesta obra està protegida pels drets de propietat intel·lectual i
industrial corresponents. Sense perjudici de les exempcions legals existents, queda prohibida la seva
reproducció, distribució, comunicació pública o transformació sense l'autorització del titular dels drets
Abstract
Cyberattacks are sets of actions directed against information systems that operate on the network, canceling their services. With the increasing complexity of websites and the rapid development of applications today, the possibility of being attacked increases exponentially. The digital transformation has achieved a great number of benefits, but at the same time, life in an interconnected society has brought a series of disadvantages, thus being more exposed to cyberattacks. In addition, current technological development has also benefited "Cybercriminals", which are able to carry out sophisticated computer attacks. This panorama is an invitation to reflect on the importance of protecting networks and systems, as well as the privacy and digital rights of citizens. Having a good cybersecurity system will help to detect and protect systems against various threats. The use of Machine Learning algorithms has been the proposal of this project for the detection of cyberattacks in a network. This work presents an overview of the main threats to computer networks. Besides, a dataset containing samples from network connections, both normal and malicious, and a set of Machine Learning algorithms implemented in Python have been applied to it. The algorithms used are K-Nearest Neighbor (KNN), Random Forest (RF) and Principal Component Analysis (PCA). The performance for each algorithm has been calculated by modifying different parameters against the input data set and after having analyzed the behavior of each one, a comparison has been made between them.
TitulacióGRAU EN ENGINYERIA TELEMÀTICA (Pla 2009)
Fitxers | Descripció | Mida | Format | Visualitza |
---|---|---|---|---|
memoria.pdf | 1,513Mb | Accés restringit |