Pattern Mining in Command Histories from Cybersecurity Training – Kristián Tkáčik
Kristián Tkáčik
Bachelor's thesis
Pattern Mining in Command Histories from Cybersecurity Training
Pattern Mining in Command Histories from Cybersecurity Training
Abstract:
Moderné výukové prostredia na precvičovanie kyberbezpečnosti umožňujú inštruktorom zhromažďovať históriu zadaných príkazov z kyberbezpečnostných tréningov. Analýza týchto dát môže odhaliť cenné poznatky o vzdelávacích procesoch účastníkov. Manuálna transformácia týchto dát do užitočných informácií je však časovo náročná a neefektívna. V tejto práci sme aplikovali algoritmy dolovania asociačných pravidiel …moreAbstract:
Modern educational environments for practicing cybersecurity allow instructors to collect command histories from cybersecurity training. Analysis of these data can uncover valuable insights about the trainees' learning processes. However, manual transformation of the data into useful information is time-consuming and ineffective. In this thesis, we applied association rule mining and sequential pattern …moreKeywords
data analysis security cybersecurity training Python KYPO education data mining pattern mining association rule mining sequential pattern mining dátová analýza bezpečnosť kyberbezpečnostný tréning vzdelávanie dolovanie dát dolovanie vzorov dolovanie asociačných pravidiel dolovanie sekvenčných vzorov
Language used: English
Date on which the thesis was submitted / produced: 20. 7. 2020
Identifier:
https://is.muni.cz/th/cxvr2/
Thesis defence
- Date of defence: 25. 9. 2020
- Supervisor: RNDr. Valdemar Švábenský
- Reader: RNDr. Martin Husák, Ph.D.
Citation record
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsBachelor programme / field:
Applied Informatics / Applied Informatics
Theses on a related topic
-
Parallel Methods for Mining Frequent Sequential patterns
Quoc Bao Huynh -
Pattern Mining in Dynamic Graphs
Karel Vaculík -
Complex Data Analysis by Mining and Searching Operations
Jakub Peschel -
Comparison of data-oriented and process-oriented approaches for insider attack detection from audit logs
Marek Laššák -
Overview and Analysis of Data Vault 2.0 - Flexible Data Warehousing Methodology
Adam Hospodka -
Data analysis of production defect data
Veronika Aksamítová -
Deploying Data Lake for Big Data Management
Tomáš Chomo -
Impacts of data quality issues and biases on analysis of COVID-19 data in South Africa
Leevan Naidoo