Repository logo

Machine Learning-driven Intrusion Detection Techniques in Critical Infrastructures Monitored by Sensor Networks

dc.contributor.authorOtoum, Safa
dc.contributor.supervisorMouftah, Hussein
dc.contributor.supervisorKantarci, Burak
dc.date.accessioned2019-04-23T20:24:49Z
dc.date.available2019-04-23T20:24:49Z
dc.date.issued2019-04-23en_US
dc.description.abstractIn most of critical infrastructures, Wireless Sensor Networks (WSNs) are deployed due to their low-cost, flexibility and efficiency as well as their wide usage in several infrastructures. Regardless of these advantages, WSNs introduce various security vulnerabilities such as different types of attacks and intruders due to the open nature of sensor nodes and unreliable wireless links. Therefore, the implementation of an efficient Intrusion Detection System (IDS) that achieves an acceptable security level is a stimulating issue that gained vital importance. In this thesis, we investigate the problem of security provisioning in WSNs based critical monitoring infrastructures. We propose a trust based hierarchical model for malicious nodes detection specially for Black-hole attacks. We also present various Machine Learning (ML)-driven IDSs schemes for wirelessly connected sensors that track critical infrastructures. In this thesis, we present an in-depth analysis of the use of machine learning, deep learning, adaptive machine learning, and reinforcement learning solutions to recognize intrusive behaviours in the monitored network. We evaluate the proposed schemes by using KDD'99 as real attacks data-sets in our simulations. To this end, we present the performance metrics for four different IDSs schemes namely the Clustered Hierarchical Hybrid IDS (CHH-IDS), Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS), Restricted Boltzmann Machine-based Clustered IDS (RBC-IDS) and Q-learning based IDS (QL-IDS) to detect malicious behaviours in a sensor network. Through simulations, we analyzed all presented schemes in terms of Accuracy Rates (ARs), Detection Rates (DRs), False Negative Rates (FNRs), Precision-recall ratios, F_1 scores and, the area under curves (ROC curves) which are the key performance parameters for all IDSs. To this end, we show that QL-IDS performs with ~ 100% detection and accuracy rates.en_US
dc.identifier.urihttp://hdl.handle.net/10393/39090
dc.identifier.urihttp://dx.doi.org/10.20381/ruor-23338
dc.language.isoenen_US
dc.publisherUniversité d'Ottawa / University of Ottawaen_US
dc.subjectWireless Sensor Networks (WSNs)en_US
dc.subjectNetworks securityen_US
dc.subjectDeep Learningen_US
dc.subjectMachine Learningen_US
dc.subjectReinforcement Learningen_US
dc.subjectIntrusion Detection Systemen_US
dc.titleMachine Learning-driven Intrusion Detection Techniques in Critical Infrastructures Monitored by Sensor Networksen_US
dc.typeThesisen_US
thesis.degree.disciplineGénie / Engineeringen_US
thesis.degree.levelDoctoralen_US
thesis.degree.namePhDen_US
uottawa.departmentScience informatique et génie électrique / Electrical Engineering and Computer Scienceen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
Otoum_Safa_2019_thesis.pdf
Size:
1.85 MB
Format:
Adobe Portable Document Format
Description:
Safa Otoum - Ph.D. thesis - Electrical and Computer Engineering

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
license.txt
Size:
6.65 KB
Format:
Item-specific license agreed upon to submission
Description: