Artificial Intelligence and Cybersecurity: Building an Automotive Cybersecurity Framework Using Machine Learning Algorithms
dc.contributor.author | Kaja, Nevrus | |
dc.contributor.advisor | Ma, Di | |
dc.contributor.advisor | Shaout, Adnan | |
dc.date.accessioned | 2019-06-12T18:58:56Z | |
dc.date.available | NO_RESTRICTION | en_US |
dc.date.available | 2019-06-12T18:58:56Z | |
dc.date.issued | 2019-08-23 | |
dc.date.submitted | 2019-04-16 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/149467 | |
dc.description.abstract | Automotive technology has continued to advance in many aspects. As an outcome of such advancements, autonomous vehicles are closer to commercialization and have brought to life a complex automotive technology ecosystem [1]. Like every other technology, these developments bring benefits but also introduce a variety of risks. One of these risks in the automotive space is cybersecurity threats. In the case of cars, these security challenges can produce devastating results and tremendous costs, including loss of life. Therefore, conducting a clear analysis, assessment and detection of threats solves some of the cybersecurity challenges in the automotive ecosystem. This dissertation does just that, by building a three-step framework to analyze, assess,and detect threats using machine learning algorithms. First, it does an analysis of the connected vehicle threats while leveraging the STRIDE framework [2]. Second, it presents an innovative, Fuzzy based threat assessment model (FTAM). FTAM leverages threat characterizations from established threat assessment models while focusing on improving its assessment capabilities by using Fuzzy logic. Through this methodology, FTAM can improve the efficiency and accuracy of the threat assessment process by using Fuzzy logic to determine the “degree” of the threat over other existing methods. This differs from the current threat assessment models which use subjective assessment processes based on table look-ups or scoring. Thirdly, this dissertation proposes an intrusion detection system (IDS) to detect malicious threats while taking in consideration results from the previous assessment stage. This IDS uses the dataset provided from Wyoming Connected Vehicle Deployment program [3] and consists of a two-stage intrusion detection system based on supervised and unsupervised machine learning algorithms. The first stage uses unsupervised learning to detect whether there is an attack present and the second stage classifies these attacks in a supervised learning fashion. The second stage also addresses data bias and eliminates the number of false positives. The simulation of this approach results in an IDS able to detect and classify attacks at a 99.965% accuracy and lowers the false positives rate to 0%. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Artificial intelligence | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Fuzzy logic | en_US |
dc.subject | Threat models | en_US |
dc.subject | Automotive | en_US |
dc.subject.other | Electrical and Computer Engineering | en_US |
dc.title | Artificial Intelligence and Cybersecurity: Building an Automotive Cybersecurity Framework Using Machine Learning Algorithms | en_US |
dc.type | Thesis | |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Malik, Hafiz | |
dc.contributor.committeemember | Zakarian, Armen | |
dc.identifier.uniqname | 1264 5428 | en_US |
dc.description.bitstreamurl | https://deepblue.lib.umich.edu/bitstream/2027.42/149467/1/Nevrus Kaja PhD Dissertation V24.pdf | |
dc.identifier.orcid | 0000-0002-9625-7032 | en_US |
dc.description.filedescription | Description of Nevrus Kaja PhD Dissertation V24.pdf : Dissertation | |
dc.identifier.name-orcid | Kaja, Nevrus; 0000-0002-9625-7032 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.