Exploring data leakage via supervised learning
dc.contributor.author | Khaleghimoghaddam, Amir | |
dc.contributor.copyright-release | Not Applicable | en_US |
dc.contributor.degree | Master of Computer Science | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | n/a | en_US |
dc.contributor.graduate-coordinator | Michael McAllister | en_US |
dc.contributor.manuscripts | Not Applicable | en_US |
dc.contributor.thesis-reader | Dr. Srinivas Sampalli | en_US |
dc.contributor.thesis-reader | Dr. Malcolm Heywood | en_US |
dc.contributor.thesis-supervisor | Dr. Nur Zincir-Heywood | en_US |
dc.date.accessioned | 2020-04-20T15:03:53Z | |
dc.date.available | 2020-04-20T15:03:53Z | |
dc.date.defence | 2020-04-07 | |
dc.date.issued | 2020-04-20T15:03:53Z | |
dc.description.abstract | Data security includes but not limited to, data encryption, tokenization, and key management practices that protect data across all applications and platforms. In this thesis, I aim to explore whether any data leakage takes place in data encryption when encrypted data is analyzed using supervised machine learning techniques. In the literature, researchers studied reverse engineering the encrypted data or brute forcing the attacks against encryption algorithms in order to study data leakage. However, in this research, my goal is not to reverse engineer or brute force the ciphertext, but to explore whether a supervised learning algorithm could identify a pattern that could potentially leak data in ciphertext. To this end, I analyze four encryption algorithms using five supervised learning techniques on four different datasets. The results show that as the encryption algorithms get stronger, the data leakage decreases, even though the data leakage is never zero percent. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/78640 | |
dc.language.iso | en | en_US |
dc.subject | machine learning | en_US |
dc.subject | data mining | en_US |
dc.subject | text classification | en_US |
dc.subject | cyber security | en_US |
dc.title | Exploring data leakage via supervised learning | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Khaleghimoghaddam_Amir_McSc_CSCI_April_2020.pdf
- Size:
- 4.6 MB
- Format:
- Adobe Portable Document Format
- Description:
- Thesis PDF File
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: