Show simple item record

dc.contributor.advisorHeydari, Shahram
dc.contributor.authorChauhan, Ravi
dc.date.accessioned2021-02-26T15:54:14Z
dc.date.accessioned2022-03-29T17:26:06Z
dc.date.available2021-02-26T15:54:14Z
dc.date.available2022-03-29T17:26:06Z
dc.date.issued2020-12-01
dc.identifier.urihttps://hdl.handle.net/10155/1249
dc.description.abstractIDS are essential components in preventing malicious traffic from penetrating networks. IDS have been rapidly enhancing their detection ability using ML algorithms. As a result, attackers look for new methods to evade the IDS. Polymorphic attacks are favorites among the attackers as they can bypass the IDS. GAN is a method proven in generating various forms of data. It is becoming popular among security researchers as it can produce indistinguishable data from the original data. I proposed a model to generate DDoS attacks using a WGAN. I used several techniques to update the attack feature profile and generate polymorphic data. This data will change the feature profile in every cycle to test if the IDS can detect the new version attack data. Simulation results from the proposed model show that by continuous changing of attack profiles, defensive systems that use incremental learning will still be vulnerable to new attacks.en
dc.description.sponsorshipUniversity of Ontario Institute of Technologyen
dc.language.isoenen
dc.subjectAdversarial attacksen
dc.subjectGenerative Adversarial Networks (GAN)en
dc.subjectIntrusion detection systemen
dc.subjectDDoS attacksen
dc.subjectMachine learningen
dc.titlePolymorphic Adversarial DDoS attack on IDS using GANen
dc.typeThesisen
dc.degree.levelMaster of Science (MSc)en
dc.degree.disciplineComputer Scienceen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record