Data exploration and preparation assignment

Assignment Help Other Subject
Reference no: EM133840965

Assignment - Data Exploration and Preparation

Scenario

WA Cyber Command - WACY-COM has acquired aggregate data about 200,000 identified cyber-attacks and scans. The data are sourced from a Honey-pot project which places fake servers across the globe and records attacker activity and techniques. As Honeypots are simulated networks and devices, they allow researchers to safely monitor malicious traffic without endangering real computers or networks.

When analysing cyber-attacks, the level of sophistication of attackers can range in from low-level scammers, right up to Advanced Persistent Threats (APTs) which are often associated with state-sponsored cyber-attacks. The attacker tools and techniques generally vary depending on the sophistication of the attacker.

A research project has been undertaken by WACY-COM to determine what patterns exist in state-sponsored APT attacks.

Typically, a complex attack can involve multiple attacking computers (with different source-IP addresses) and different payloads and targets. By coordinating attacks from multiple devices, the attacks can become more difficult to detect and stop.

Note: The scenario and data are loosely based on real-world cyber threats and attacks. However, this data set has been curated entirely to help you understand the types of data, correlations and issues that you may experience when handling real-world cyber security data.

Data description
The aggregated data available to WACY-COM are described by the following features (with data types given in square brackets):

[Categorical] Port - The port or service that was being attacked on the honey-pot network. Well known ports include 80/443 (Web traffic), 25 (Email reception), 993 (Email collection)
[Categorical] Protocol - The Internet Protocol in use to conduct the attack [Numeric] Hits - How many ‘hits' the attacker made against the network [Numeric] Average Request Size (Bytes) - Average ‘payload' sent by the attacker [Numeric] Attack Window (Seconds) - Duration of the attack
[Numeric] Average Attacker Payload Entropy (Bits) - An attempt to qualify whether payload data were encrypted (higher Shannon entropy may indicate random data, data obfuscation or encryption)

[Categorical] Target Honeypot Server OS - The Operating System of the simulated server
[Numeric] Attack Source IP Address Count - How many unique IP addresses were used in the attack
[Numeric] Average ping to attacking IP (milliseconds) - Used to detect ‘distance' to the attacker. The average ping time ‘back‘ to the attacker's IP addresses were calculated. [Numeric] Average ping variability (st.dev) - High variability pings can indicate a saturated or unreliable link.
[Numeric] Individual URLs requested - How many different URLs were probed or attacked (Only relevant for Web Server ports)
[Categorical] Source OS (Detected) - The detected operating system of the attacking IP address. Acquired by scanning and fingerprinting the IP address of the attacking server [Categorical] Source Port Range - What range of source ports were used by the attacker. Typically, ‘low' ports are reserved for system services. Higher ports are used by end- user applications.
[Categorical] Source IP Type (Detected) - Whether the IP of the attacker can be linked to known proxies/VPNs or TOR (technologies that can be used to hide the real source of the attack), or Likely ISP traffic (which may indicate the attacker is leveraging compromised end-user computers)
[Numeric] IP Range Trust Score - A trust score generated by an existing WACY-COM system. This system integrates with open-source intelligence (OS-Int) databases to identify potentially compromised on malicious IP addresses
[Binary] APT - Was the attack conducted by a known Advanced Persistent Threat actor (APT).
The raw data for the above variables are contained in the WACY-COM.csv file.

Objectives
You have been brought on as part of a data analysis team to determine if APT activity can be inferred from other attack parameters.

Your task is to perform data exploration and basic analysis, identify issues in the dataset, and recommend appropriate actions to address them.

Task
First, copy the code below to a R script. Enter your student ID into the command set.seed(.) and run the whole code. The code will create a sub-sample that is unique to you. Can you do my assignment for me? We sure can!

You are required to perform basic data analysis on the relevant features in mydata using R and report your findings.

Exploratory Data Analysis and Data Cleaning
For each categorical or binary variable, determine the frequency N and percentage (%) of instances in each category and summarise the results in a table as follows. You do not need to recreate the table in R; your code only needs to generate the statistics required to populate it. You may export or copy the values to Microsoft Excel and format the table there. State all percentages to 1 decimal places.

Summarise each of your continuous/numeric variables in a table as follows. State all decimal values to 1 decimal place.

Examine the value in the tables in parts (i) and (ii). Are there any invalid categories/values for the categorical variables? If so, how will you deal with them and why? Is there any evidence of outliers for any of the continuous/numeric variables? If so, how many and what percentage are there and how will you deal with them? Justify your decision in the treatment of outliers (if any).

Note: You may use plots/graphs to further support your observations/decisions.

A single report, not exceeding three (3) pages (excluding the cover page, contents page, and references, if applicable), containing:
summary tables of all the variables in the dataset;
a list of data issues (if any) and how you will deal with them in the data cleaning process.

Solutions should be in the order that the questions were posed in the assignment.

If you reference any sources in your analysis or discussion beyond the notes provided in the unit, you must cite them, including the use of ChatGPT or any other generative AI platform.

The dataset containing your sub-sample of 400 observations, i.e., mydata. A copy of your R code.

Reference no: EM133840965

Questions Cloud

Will you go to the mall with me today : "Will you go to the mall with me today?" "Why should I?" "Why shouldn't you?" Argument Type is Fallacious or Non-Fallacious?
Infants playing with sand act : Infants playing with sand. Act and Do (Implementation) Implement your experience: Did you need to modify for any reason?
Analyze a specific ethical challenge nursing leader may face : analyze a specific ethical challenge nursing leaders may face. Discuss potential consequences of ethical dilemma on patients, staff and healthcare institution.
How do philosophers like descartes-kant-brentano : How do Philosophers like Descartes, Kant, Brentano, and Husserl, explain knowledge?
Data exploration and preparation assignment : Determine what patterns exist in state-sponsored APT attacks - The attacker tools and techniques generally vary depending on the sophistication of the attacker
Symptoms of nausea-headache and backache : A 25-year-old female presents with symptoms of nausea, headache, and backache. Despite consultation with her primary care provider,
What happens without the intersectionality framing : Discuss the framing intersectionality provides and why we need this framing in order to see or understand. What happens without the intersectionality framing?
One significant problem reported in flyer is food insecurity : One significant problem reported in flyer is food insecurity. Food insecurity among college students during the COVID-19 pandemic has been a considerable issue
Population health depends on expert performance : Population health depends on expert performance in six functional areas. Which one of the following is not one of the functional performance areas?

Reviews

Write a Review

 

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd