語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A Machine Learning Approach for Enha...
~
Rajab, Adel Dabash A.
A Machine Learning Approach for Enhancing Security and Quality of Service of Optical Burst Switching Networks.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
A Machine Learning Approach for Enhancing Security and Quality of Service of Optical Burst Switching Networks./
作者:
Rajab, Adel Dabash A.
面頁冊數:
1 online resource (132 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
Contained By:
Dissertation Abstracts International79-08B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780355666304
A Machine Learning Approach for Enhancing Security and Quality of Service of Optical Burst Switching Networks.
Rajab, Adel Dabash A.
A Machine Learning Approach for Enhancing Security and Quality of Service of Optical Burst Switching Networks.
- 1 online resource (132 pages)
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
Thesis (Ph.D.)--University of South Carolina, 2017.
Includes bibliographical references
The Optical Bust Switching (OBS) network has become the most promising switching technology for building the next generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flood attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, a high burst loss rate, and eventually, DoS. In this dissertation, we focus our investigations on the network security and QoS in the presence of BHP flooding attacks. First, we proposed and developed a new security model that can be embedded into OBS core switch architecture to prevent BHP flooding attacks. The countermeasure security model allows the OBS core switch to classify the ingress nodes based on their behavior and the amount of reserved resources not being utilized. A malicious node causing a BHP flooding attack will be blocked by the developed model until the risk disappears or the malicious node redeems itself. Using our security model, we can effectively and preemptively prevent a BHP flooding attack regardless of the strength of the attacker. In the second part of this dissertation, we investigated the potential use of machine learning (ML) in countering the risk of the BHP flood attack problem. In particular, we proposed and developed a new series of rules, using the decision tree method to prevent the risk of a BHP flood attack. The proposed classification rule models were evaluated using different metrics to measure the overall performance of this approach. The experiments showed that using rules derived from the decision trees did indeed counter BHP flooding attacks, and enabled the automatic classification of edge nodes at an early stage. In the third and final part of this dissertation, we performed a comparative study, evaluating a number of ML techniques in classifying edge nodes, to determine the most suitable method to prevent this type of attack. The experimental results from a processed dataset related to BHP flood attacks showed that rule based classifiers, in particular decision trees (C4.5), Bagging, and RIDOR, consistently derive high predictive classifiers, compared to alternate ML algorithms, including AdaBoost, Logistic Regression, Naive Bayes, SVM-SMO and ANN-MultilayerPerceptron. Moreover, the harmonic mean, recall and precision results of the rule-based and tree classifiers were more competitive than those of the remaining ML algorithms. Lastly, the runtime results in ms showed that decision tree classifiers are not only more predictive, but are also more efficient than other algorithms. Thus, this is the most appropriate technique for classifying ingress nodes to combat the BHP flood attack problem.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355666304Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
A Machine Learning Approach for Enhancing Security and Quality of Service of Optical Burst Switching Networks.
LDR
:04293ntm a2200337Ki 4500
001
916820
005
20180928111501.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355666304
035
$a
(MiAaPQ)AAI10637865
035
$a
(MiAaPQ)sc:15316
035
$a
AAI10637865
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Rajab, Adel Dabash A.
$3
1190665
245
1 2
$a
A Machine Learning Approach for Enhancing Security and Quality of Service of Optical Burst Switching Networks.
264
0
$c
2017
300
$a
1 online resource (132 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
500
$a
Adviser: Chin-Tser Huang.
502
$a
Thesis (Ph.D.)--University of South Carolina, 2017.
504
$a
Includes bibliographical references
520
$a
The Optical Bust Switching (OBS) network has become the most promising switching technology for building the next generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flood attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, a high burst loss rate, and eventually, DoS. In this dissertation, we focus our investigations on the network security and QoS in the presence of BHP flooding attacks. First, we proposed and developed a new security model that can be embedded into OBS core switch architecture to prevent BHP flooding attacks. The countermeasure security model allows the OBS core switch to classify the ingress nodes based on their behavior and the amount of reserved resources not being utilized. A malicious node causing a BHP flooding attack will be blocked by the developed model until the risk disappears or the malicious node redeems itself. Using our security model, we can effectively and preemptively prevent a BHP flooding attack regardless of the strength of the attacker. In the second part of this dissertation, we investigated the potential use of machine learning (ML) in countering the risk of the BHP flood attack problem. In particular, we proposed and developed a new series of rules, using the decision tree method to prevent the risk of a BHP flood attack. The proposed classification rule models were evaluated using different metrics to measure the overall performance of this approach. The experiments showed that using rules derived from the decision trees did indeed counter BHP flooding attacks, and enabled the automatic classification of edge nodes at an early stage. In the third and final part of this dissertation, we performed a comparative study, evaluating a number of ML techniques in classifying edge nodes, to determine the most suitable method to prevent this type of attack. The experimental results from a processed dataset related to BHP flood attacks showed that rule based classifiers, in particular decision trees (C4.5), Bagging, and RIDOR, consistently derive high predictive classifiers, compared to alternate ML algorithms, including AdaBoost, Logistic Regression, Naive Bayes, SVM-SMO and ANN-MultilayerPerceptron. Moreover, the harmonic mean, recall and precision results of the rule-based and tree classifiers were more competitive than those of the remaining ML algorithms. Lastly, the runtime results in ms showed that decision tree classifiers are not only more predictive, but are also more efficient than other algorithms. Thus, this is the most appropriate technique for classifying ingress nodes to combat the BHP flood attack problem.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Artificial intelligence.
$3
559380
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0800
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of South Carolina.
$b
Computer Science and Engineering.
$3
1190656
773
0
$t
Dissertation Abstracts International
$g
79-08B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10637865
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入