Please use this identifier to cite or link to this item: https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4802
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWeerasinghe, B.S-
dc.date.accessioned2024-10-16T05:15:58Z-
dc.date.available2024-10-16T05:15:58Z-
dc.date.issued2024-05-
dc.identifier.urihttps://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4802-
dc.description.abstractAbstract Traditional network security measures, while effective in fortifying network infrastructure, face limitations in scenarios where physical interception of network traffic is unfeasible, such as in network forensics investigations or within resource-constrained Internet of Things (IoT) environments. This necessitates the development of noninvasive detection techniques capable of discerning malicious network activities without imposing undue burdens on network resources. In recent years, exploration into Electromagnetic Radiation (EMR) analysis has emerged as a promising avenue for non-invasive monitoring and analysis of network traffic. This research investigates the viability of employing Electromagnetic (EM) side-channel analysis (SCA) to detect malicious network activities in wired Ethernet environments. A hardware setup was devised to simulate an attacker and a victim connected via a Cat 6 cable. Three types of Denial of Service (DoS) attacks (DoS HTTP, DoS TCP, DoS UDP) were simulated across the cable, and respective EM traces were captured. Additionally, benign traffic traces were collected during periods of no intentional communication between the two devices. An H-loop antenna connected to a HackRF One software-defined radio (SDR) device was utilized for data collection. These traces were divided into training and testing datasets, with the training set used to train three models: Random Forest Classifier (RFC) with AdaBoost, Multilayer Perceptron (MLP), and Support Vector Machine (SVM). Subsequently, the model was applied to the testing set, achieving a classification accuracy of 99.70% for distinguishing between normal and malicious traces. These findings demonstrate the feasibility of detecting malicious network-based attacks in a non-invasive manner with sufficient reliability.en_US
dc.language.isoenen_US
dc.titleMalicious Network Activity Detection through Electromagnetic Radiation in Wired Etherneten_US
dc.typeThesisen_US
Appears in Collections:2024

Files in This Item:
File Description SizeFormat 
2019 CS 185.pdf7.56 MBAdobe PDFView/Open


Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.