Utilizing deep abstraction for higher intrusion-detection in wireless networks무선 네트워크에서 침입 탐지 성능 향상을 위한 심층 추상화 기법 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 363
  • Download : 0
The recent advances in mobile technologies have resulted in IoT-enabled devices becoming more pervasive and integrated into our daily lives. The connected devices are ubiquitous, generating huge, high-dimensional and complex data. Observing malicious activities, which deviate from normal behavior, in such colossal data is a challenging task. Feature learning, however, can be one solution to solve this task. This dissertation thus proposes novel feature-learning schemes using Deep-Feature Extraction and Selection (D-FES) and fully unsupervised method. D-FES combines stacked feature extraction and weighted feature selection. The stacked auto-encoding is capable of providing abstractions (representations) that are more meaningful by reconstructing the relevant information from its raw inputs. The representations could also be leveraged as a clustering method. We then combine this with modified weighted feature selection inspired by an existing shallow-structured machine learning. We finally demonstrate the ability of the condensed set of features to reduce the bias of a machine learning model and the computational complexity of training and testing. We verify our proposed schemes on a Wi-Fi network dataset, called, the Aegean Wi-Fi Intrusion Dataset (AWID), prove the usefulness and the usability of the D-FES by achieving an impersonation detection accuracy of 99.918% and a false alarm rate of 0.012%. D-FES also achieved 99.910% of accuracy during all class of attacks detection.
Advisors
Kim, Kwangjoresearcher김광조researcher
Description
한국과학기술원 :전산학부,
Publisher
한국과학기술원
Issue Date
2018
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 전산학부, 2018.8,[v, 90 p. :]

Keywords

Stacked auto encoder▼adeep abstraction▼aextraction▼aselection▼aclustering▼aintrusion detection▼awireless networks▼aimpersonation attack; 중첩된 오토 인코더▼a심층 추상화▼a추출▼a선택▼a클러스터링▼a침입 탐지▼a위장 공격

URI
http://hdl.handle.net/10203/265308
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=828235&flag=dissertation
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0