Show simple item record

dc.contributor.advisorChakrabarty, Amitabha
dc.contributor.authorArko, Aritro Roy
dc.contributor.authorKhan, Saadat Hasan
dc.contributor.authorPreety, A a Anjum
dc.contributor.authorBiswas, Mehrab Hossain
dc.date.accessioned2019-10-02T08:34:38Z
dc.date.available2019-10-02T08:34:38Z
dc.date.copyright2019
dc.date.issued2019-08
dc.identifier.otherID 15201020
dc.identifier.otherID 15201013
dc.identifier.otherID 15301046
dc.identifier.otherID 15201008
dc.identifier.urihttp://hdl.handle.net/10361/12776
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2019.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 43-45).
dc.description.abstractInternet of Things (IoT) is growing as one of the fastest developing technologies around the world. With IPv6 settling down, people have a lot of addressing spaces left that even allows sensors to communicate with each other while collecting data, leaving alone cars that communicate while travelling. IoT (Internet of Things) has changed how humans, machines and devices communicate with one another. However, with its growth, a very alarming topic is the security and privacy issues that are encountered regularly. As many devices exchange their data through internet, there is a high possibility that a device may be attacked with a malicious packet of data. In such cases, the security of the network of communication should be strong enough to identify malicious data. In other words, it is very important to create an intrusion detection system for the network. In our research, we propose a comparison between di erent machine learning algorithms that can be used to identify any malicious or anomalous data and provide the best algorithm for two data-sets. One dataset is on the environmental characteristics collected from sensors and another one is network dataset. The rst data-set is developed from the data exchanged between the sensors in an IoT environment and the second dataset is UNSW-NB15 data which is available online.en_US
dc.description.statementofresponsibilityAritro Roy Arko
dc.description.statementofresponsibilitySaadat Hasan Khan
dc.description.statementofresponsibilityA a Anjum Preety
dc.description.statementofresponsibilityMehrab Hossain Biswas
dc.format.extent45 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectIoT (Internet of Things)en_US
dc.subjectAnomaly detectionen_US
dc.subjectIntrusion detectionen_US
dc.subjectMachine learning algorithmsen_US
dc.subjectSensor dataen_US
dc.subjectNetwork dataen_US
dc.subjectUNSW-NB15en_US
dc.subject.lcshMachine learning
dc.subject.lcshInternet of things
dc.subject.lcshIntrusion detection systems (Computer security)
dc.subject.lcshAnomaly detection (Computer security)
dc.titleAnomaly detection In IoT using machine learning algorithmsen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB. Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record