Cognitive unsupervised clustering for detecting cyber attacks

dc.contributor.authorNahiyan, Kaiser
dc.contributor.examiningcommitteeMcLeod, Bob (Electrical and Computer Engineering) Mohammed, Noman (Computer Science)en_US
dc.contributor.supervisorFerens, Ken (Electrical and Computer Engineering)en_US
dc.date.accessioned2020-07-02T16:40:45Z
dc.date.available2020-07-02T16:40:45Z
dc.date.copyright2020-06-27
dc.date.issued2020-06-26en_US
dc.date.submitted2020-06-27T18:23:42Zen_US
dc.degree.disciplineElectrical and Computer Engineeringen_US
dc.degree.levelMaster of Science (M.Sc.)en_US
dc.description.abstractIt has always been a challenge to extract meaning out of unstructured data. In the field of network intrusion detection, the availability of structured, labelled datasets is limited. Most approaches adhere to techniques that demand high-end computing resources, and do not yield satisfactory results; hence human analysts must examine all the network events in order to isolate intrusion attempts. This study proposes an intelligent approach of extracting information out of large unstructured and unlabeled datasets and performs unsupervised detection of attack traffic from normal network traffic, utilizing the concepts of cognitive learning, complexity analysis, and statistical higher-order feature learning. The thesis aims to develop a methodology for the human analysts to disregard a major portion of the network dataset that contains regular traffic, and focus on the finite time-windows that have been subjected to potential attacks. Statistical higher-order feature extraction from network flows was used to create significant features out of the large unlabelled network intrusion detection dataset, which was later classified using unsupervised kmeans clustering and variance fractal dimension trajectory (VFDT) based complexity analysis. The proposed methodology has been validated using the UNSW-NB15 network intrusion dataset and the performance measures used are; detection accuracy, false positive and false negative rate, Receiver Operation Characteristics curve, Area Under Curve Value, and F1 score. Subsequently, a comparative analysis of the proposed model with a prominent traditional unsupervised machine learning technique (i.e. standard kmeans clustering) based scheme has been performed to evaluate and benchmark the efficacy of the proposed methodology. The empirically validated results show that the proposed cognitive unsupervised clustering technique-based model outperforms the general unsupervised detection scheme based on performance measures such as detection accuracy, false positive and false negative rates, Area Under Curve Value and F1 score.en_US
dc.description.noteOctober 2020en_US
dc.identifier.urihttp://hdl.handle.net/1993/34747
dc.language.isoengen_US
dc.rightsopen accessen_US
dc.subjectCognitive Intelligenceen_US
dc.subjectMachine Intelligenceen_US
dc.subjectFractalsen_US
dc.subjectClassificationen_US
dc.subjectCognitive Computingen_US
dc.subjectPacket Capturesen_US
dc.subjectComplexity Analysisen_US
dc.subjectPacket Capturesen_US
dc.subjectNetwork Threatsen_US
dc.subjectCyber Securityen_US
dc.subjectCognitive Informaticsen_US
dc.titleCognitive unsupervised clustering for detecting cyber attacksen_US
dc.typemaster thesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Nahiyan_Kaiser.pdf
Size:
1.79 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.2 KB
Format:
Item-specific license agreed to upon submission
Description: