Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Optimized And Automated Machine Learning Techniques Towards Iot Data Analytics And Cybersecurity, Li Yang Aug 2022

Optimized And Automated Machine Learning Techniques Towards Iot Data Analytics And Cybersecurity, Li Yang

Electronic Thesis and Dissertation Repository

The Internet-of-Things (IoT) systems have emerged as a prevalent technology in our daily lives. With the wide spread of sensors and smart devices in recent years, the data generation volume and speed of IoT systems have increased dramatically. In most IoT systems, massive volumes of data must be processed, transformed, and analyzed on a frequent basis to enable various IoT services and functionalities. Machine Learning (ML) approaches have shown their capacity for IoT data analytics. However, applying ML models to IoT data analytics tasks still faces many difficulties and challenges. The first challenge is to process large amounts of dynamic …


Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang Mar 2021

Strategies In Botnet Detection And Privacy Preserving Machine Learning, Di Zhuang

USF Tampa Graduate Theses and Dissertations

Peer-to-peer (P2P) botnets have become one of the major threats in network security for serving as the infrastructure that responsible for various of cyber-crimes. Though a few existing work claimed to detect traditional botnets effectively, the problem of detecting P2P botnets involves more challenges. In this dissertation, we present two P2P botnet detection systems, PeerHunter and Enhanced PeerHunter. PeerHunter starts from a P2P hosts detection component. Then, it uses mutual contacts as the main feature to cluster bots into communities. Finally, it uses community behavior analysis to detect potential botnet communities and further identify bot candidates. Enhanced PeerHunter is an …


Investigation Of Machine Learning Algorithms For Intrusion Detection System In Cybersecurity, Mohmmed Alrowaily Mar 2020

Investigation Of Machine Learning Algorithms For Intrusion Detection System In Cybersecurity, Mohmmed Alrowaily

USF Tampa Graduate Theses and Dissertations

The proliferation in usage and complexity of modern communication and network systems, a large number of trustworthy online Services and systems have been deployed. Even so, cybersecurity threats are still growing. An Intrusion Detection System (IDS) play a vital role in ensuring the security of communication networks, and it is taken into account as the subsequent security gate after the firewall. The IDS informs the system or network administrator in order to take specific actions to evade the suspicious activities. Three significant contributions are made during the course of this research to illustrate the feasibility of these IDS approaches. In …


Cross Layer-Based Intrusion Detection System Using Machine Learning For Manets, Amar Amouri Apr 2019

Cross Layer-Based Intrusion Detection System Using Machine Learning For Manets, Amar Amouri

USF Tampa Graduate Theses and Dissertations

Intrusion Detection systems plays a crucial role in detecting malicious activities that deteriorate the performance of the network. Mobile AdHoc Networks (MANETs) and Wireless Sensor Networks (WSNs) are a type of wireless networks that can deliver data without any need of infrastructure for their operation. The distributed nature of these networks and the limited resources available, pose a huge challenge for the security of a network. The need for an IDS that can adapt with such challenges is of utmost importance.

Two IDS schemes are presented in this dissertation; the first scheme is based on utilizing the promiscuous mode based …


Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco Jan 2019

Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco

Theses and Dissertations--Computer Science

Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …


Secure Cloud Controlled Software Defined Radio Network For Bandwidth Allocation, Isaac J. Cushman Jan 2017

Secure Cloud Controlled Software Defined Radio Network For Bandwidth Allocation, Isaac J. Cushman

Electronic Theses and Dissertations

The purpose of this research is to investigate the impact of mobility of wireless devices for opportunistic spectrum access and communications using National Instrument Universal Software Radio Peripherals devices. The overall system utilizes software defined radio networks for frequency allocation, cloud connectivity to maintain up-to-date information, and moving target defense as a security mechanism. Each USRP device sends its geolocation to query the spectrum database for idle channels. The cloud cluster was designed for complex data storage and allocation using a smart load balancer to offer ultra-security to users. This project also explores the advantages of data protection and security …


A Control Theoretic Approach For Security Of Cyber-Physical Systems, Haifeng Niu Jan 2016

A Control Theoretic Approach For Security Of Cyber-Physical Systems, Haifeng Niu

Doctoral Dissertations

"In this dissertation, several novel defense methodologies for cyber-physical systems have been proposed. First, a special type of cyber-physical system, the RFID system, is considered for which a lightweight mutual authentication and ownership management protocol is proposed in order to protect the data confidentiality and integrity. Then considering the fact that the protection of the data confidentiality and integrity is insufficient to guarantee the security in cyber-physical systems, we turn to the development of a general framework for developing security schemes for cyber-physical systems wherein the cyber system states affect the physical system and vice versa. After that, we apply …


Security Issues In Network Virtualization For The Future Internet, Sriram Natarajan Sep 2012

Security Issues In Network Virtualization For The Future Internet, Sriram Natarajan

Open Access Dissertations

Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. Since a single protocol stack cannot accommodate the requirements of diverse application scenarios and network paradigms, it is evident that multiple networks should co-exist on the same network infrastructure. Network virtualization supports this feature by hosting multiple, diverse protocol suites on a shared network infrastructure. Each hosted virtual network instance can dynamically instantiate custom set of protocols and functionalities on the allocated resources (e.g., link bandwidth, CPU, memory) from the network substrate. As this technology matures, it is important to consider …