ISECTIONA:CaseStudy - 20 Marks
QUESTION1
20 marks
XVZCorporation, a multinational company, has been experiencing suspicious activities on its network.
There have been multiple unauthorised access attempts, and some servers have shown unusual
traffic patterns. The company has vast amounts of network log data and wants to implement a
machine learning-based Intrusion Detection System (IDS) to identify and prevent potential security
breaches.
(a) Outline the steps you would take to preprocess the network log data before applying machine
learning algorithms.
(5 marks)
(b) Recommend and justify two suitable machine learning algorithms for building the IDS.Explain
how each algorithm works and why it is appropriate for this scenario.
(10 marks)
(c) Discusspotential challenges you might face when deploying the machine learning-based IDS
in a real-world environment. Propose solutions to address these challenges.
(5 marks)
ISECTIONB- SOMarks
QUESTION2
15 marks
(a) Explain how data analytics can detect Denial of Service (DoS) and Distributed Denial of
Service (DDoS)attacks. Discussthe types of data you would analyse and the indicators of
such attacks.
(7 marks)
(b) Describe how you would design a simulation model to test the effectiveness of your Dos
detection method. Include the steps and tools you would use.
(8 marks)
Page 2