DEVELOPING CROSS-DOMAIN INTRUSION DETECTION SYSTEMS

dc.contributor.advisorGangopadhyay, Aryya
dc.contributor.authorAjayi, Oluwagbemiga Nelson
dc.contributor.departmentInformation Systems
dc.contributor.programInformation Systems
dc.date.accessioned2023-04-05T14:17:01Z
dc.date.available2023-04-05T14:17:01Z
dc.date.issued2022-01-01
dc.description.abstractDigital transformation has continued to make a remarkable impact on industries, creating new possibilities and improving the performance of existing ones. Recently, we have seen more deployments of cyber-physical systems and Internet ofthings (IoT) like no other time. However, cybersecurity is often an afterthought in the design and implementation of many systems; so, there usually is an introduction of new attack surfaces as new systems and applications are being deployed. Machine learning has been helpful in creating intrusion detection models but it is impractical to create attack detection models with acceptable performance for every single attack scenario and various computing infrastructures partly due to the cost of collecting quality labeled data and training models. Hence there is a need to develop models that can take advantage of the knowledge available in a high-resource source domain to improve the performance of a low-resource target domain model. In this research, we propose a cross-domain deep learning-based approach for attack detection in both Network Intrusion Detection Systems (NIDS) and Host-based Intrusion Detection Systems (HIDS). Specifically, we developed a method for candidate source domain selection from among a group of potential source domains by computing the similarity score a target domain records when paired with a potential source domain. Then, using different data representation combination techniques and transfer learning, we leverage the knowledge from a well-performing source domain model to improve the performance of a similar model in the target domain. Results show that the proposed cross-domain approach recorded significant improvement in target domains of NIDS and HIDS when compared with the result from existing approaches.
dc.formatapplication:pdf
dc.genredissertations
dc.identifierdoi:10.13016/m2nyza-junh
dc.identifier.other12665
dc.identifier.urihttp://hdl.handle.net/11603/27324
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.sourceOriginal File Name: Ajayi_umbc_0434D_12665.pdf
dc.titleDEVELOPING CROSS-DOMAIN INTRUSION DETECTION SYSTEMS
dc.typeText
dcterms.accessRightsDistribution Rights granted to UMBC by the author.
dcterms.accessRightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ajayi_umbc_0434D_12665.pdf
Size:
4.17 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Ajayi-Oluwagbemiga_Open.pdf
Size:
186.53 KB
Format:
Adobe Portable Document Format
Description: