Adaptive machine learning and signal processing detection schemes for DDoS attacks

dc.contributor.authorGhanbari, Maryam
dc.contributor.examiningcommitteeFerens, Ken (Electrical and Computer Engineering)en_US
dc.contributor.examiningcommitteeSepehri, Nariman (Mechanical Engineering)en_US
dc.contributor.examiningcommitteeIrani, Pourang (Computer Science)en_US
dc.contributor.examiningcommitteeBaciu, George (Computing, Hong Kong Polytechnic University)en_US
dc.contributor.supervisorKinsner, Witold (Electrical and Computer Engineering)en_US
dc.date.accessioned2022-01-21T15:45:41Z
dc.date.available2022-01-21T15:45:41Z
dc.date.copyright2022-01-20
dc.date.issued2022-01-20en_US
dc.date.submitted2022-01-20T20:35:36Zen_US
dc.degree.disciplineElectrical and Computer Engineeringen_US
dc.degree.levelDoctor of Philosophy (Ph.D.)en_US
dc.description.abstractWhen cybersecurity flaws cause devices to be vulnerable to cyber-attacks, the functionality of these physical devices can be compromised which ultimately affects society. To prevent these attacks, intrusion detection systems (IDSs) can be used. In the first stage of this research, the feature extraction methods are designed as creating a mother wavelet and improving the VFD to enhance detection rate. The adaptive mother wavelet for a specific application, DDoS attacks, is created to achieve the highest similarity and adaptability to the input data. Since an Internet traffic data with distributed denial of service attacks (DDoS ITD) is a long-range dependence signal, a multiscale analysis that measures a signal with various scales is created to extract the hidden characteristics of each scale of the DDoS ITD. This research uses and expands a method that works with online variance fractal dimension. This dimension is based on a polyscale analysis, which measures a signal with various scales and its outcome correlation requires all the scales to be used simultaneously. Therefore, the hidden features of the DDoS ITD are extracted in each scale. As a result, the DDoS attacks can be detected with a higher detection rate with the polyscale analysis. In the second stage of this research, an IDS based on a convolutional neural network (CNN) is developed to enhance the sensitivity of DDoS attacks detection. As such, a weighted cost function is developed for evaluating the artificial neural network and the CNN structure. Moreover, an adaptive structure for the CNN is designed and created. For designing the IDS, the weighted cost function and the adaptive CNN structure are applied. The IDS produces 95% accuracy of detection rate. In the third stage of this research, a realistic IDS for real world is designed and implemented because the real-world data is unlabeled, so supervised learning methods are not realistic. To obtain a more realistic IDS, the proposed structure of the polyscale convolutional neural network (PCNN) regarding the policy gradient based deep reinforcement learning (DRL) is used to design and implement the IDS for unlabeled data. The IDS detects the anomalies with 93% accuracy.en_US
dc.description.noteFebruary 2022en_US
dc.identifier.citationIEEEen_US
dc.identifier.urihttp://hdl.handle.net/1993/36195
dc.language.isoengen_US
dc.rightsopen accessen_US
dc.subjectInternet traffic time seriesen_US
dc.subjectDistributed denial of service (DDoS) attacksen_US
dc.subjectArtificial neural networken_US
dc.subjectConvolutional neural networken_US
dc.subjectPolicy gradient based deep reinforcement learning (PGDRL)en_US
dc.subjectGenetic algorithmen_US
dc.subjectAdaptive mother waveleten_US
dc.subjectDesigning adaptive waveleten_US
dc.subjectWeighted cost functionen_US
dc.titleAdaptive machine learning and signal processing detection schemes for DDoS attacksen_US
dc.typedoctoral thesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ganbari_maryam.pdf
Size:
10.64 MB
Format:
Adobe Portable Document Format
Description:
Mryam Ghanbari PhD Thesis
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.2 KB
Format:
Item-specific license agreed to upon submission
Description: