It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
Recent advances in Artificial Intelligence (AI) enables computers to analyze big data and make real-time decisions. As a result, machine/deep learning techniques are increasingly used to detect threats in security applications such as anomaly detection and malware classification. AI-based security solutions must achieve high threat detection capability and robustness, because vulnerabilities exploited in such applications could lead to dire consequences. Additionally, interpretability of machine/deep learning models employed within security applications is highly desirable, because insights gained could help build better defenses to thwart future attacks. However, much work still needs to be done to improve the speed, accuracy, robustness, and explainability of AI-based security solutions. To this end, this dissertation focuses on three aspects of AI-based security solutions, namely real-time responsiveness, adversarial robustness and explainability.
First, this work introduces RAMP (Real-Time Aggregated Matrix Profile), a realtime anomaly detection model designed to detect misbehaviors in scientific workflows, which are computing paradigms widely used to facilitate scientific collaborations across multiple geographically distributed research sites. RAMP builds upon an existing time series data analysis technique called Matrix Profile to detect anomalous distances among sub-sequences of event streams collected from scientific workflows in an online manner. Using an adaptive uncertainty function, the anomaly detection model is dynamically adjusted to prevent high false alarm rates. RAMP also incorporates user feedback on reported anomalies and modifies model parameters to improve anomaly detection accuracy.
Next, this work proposes LAM (Log Anomaly Mask) to evaluate the robustness of deep-learning based anomaly detection from distributed system logs, which record states and events that occurred during the execution of a distributed system. LAM perturbs streaming logs with minimal modifications in an online fashion so that the attacks can evade anomaly detection by even the state-of-the-art deep learning models. To overcome the search space complexity challenge, LAM models the perturber as a reinforcement learning agent that operates in a partially observable environment to predict the best perturbation action.
Finally, this work introduces CFGExplainer, an interpretability solution that explains the malware classification results made by Graph Neural Networks (GNNs). GNNs that process malware as Control Flow Graphs (CFGs) have shown great promise for malware classification. However, these models are viewed as black-boxes, which makes it hard to validate and identify malicious patterns. CFGExplainer addresses this issue by identifying a subgraph of the malware CFG that contributes most towards the classification and providing insight into importance of the nodes (i.e., basic blocks) within it. We compared CFGExplainer against three explainers, namely GNNExplainer, SubgraphX and PGExplainer, and showed that CFGExplainer is able to identify top equisized subgraphs with higher classification accuracy than the other three models.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer





