Network Flow Data-Based System for Detecting Client-Server Relationships and Characterizing Host/Server Roles
Category: Network security
Location: any
Contact:
Bernhard Tellenbach
This thesis will contribute to the field of network security and management by providing a novel tool for understanding and monitoring client-server interactions using network flow data, with applications in anomaly detection, network optimization, and security policy enforcement.
Objectives
Design, implement, and evaluate a system for detecting client-server relationships and characterizing host/server roles using network flow data. The system should leverage state-of-the-art techniques and extend/improve them or compare different approaches to provide a robust solution.
Expected Outcome
- A fully functional system capable of effectively detecting client-server relationships and characterizing host/server roles based on NetFlow data.
- A report detailing the system and its performance
- A comparesion of existing methods (if applicable)
- Insights into the potential improvements and future directions in the field of network flow analysis.
Tasks
Analsis of the State-of-the-Art
Perform a comprehensive literature review on current methodologies and technologies in network traffic analysis, with a focus on client-server detection and role characterization using network flow data. It should cover existing models, algorithms, and tools used for network traffic analysis. The literature review should identify solutions that could be extended or that could be compared to each other.
System Design and Implementation
Develop and implement a system architecture integrating the indentified methodologies and technologies. The system should be able to handle large amounts of data efficiently.
Evaluation and Optimization
Evaluate the system’s accuracy, efficiency, and scalability using network flow data from data provided by EPFL and armasuisse. Perform a comparative analysis with existing approaches.
Ethical Considerations:**
- Ensure that all data collection and analysis adhere to ethical guidelines and privacy regulations.
- Discuss the ethical implications of using such a system in real-world scenarios.
Requirements
- Knowledge of networks and internet protocols
- Strong interest in network security and monitoring
- Experience with network traffic analysis is a plus
- Experience with efficient processing of big data is a plus
- Mindset to learn the additional skills