Aberdeen University Featured PhD Programmes
University of Southampton Featured PhD Programmes
Xi’an Jiaotong-Liverpool University Featured PhD Programmes
University of Glasgow Featured PhD Programmes
University of Reading Featured PhD Programmes

A novel deep learning framework for user identification via their network activities


Project Description

Applications are invited for a three year PhD to commence in October 2020.

The PhD will be based in the Faculty of Technology, and will be supervised by Dr Fudong Li, Dr Stavros Shiaeles and Dr Nick Savage.

The work on this project will:
● Conduct a comprehensive literature view on the topic of user profiling through network activities
● Collect a dataset which contains users’ network activities via both encrypted and non encrypted channels
● Undertake an experimental study on the collected dataset with the aim of network profiling individual users by utilising deep learning techniques
● Develop and evaluate a novel user identification framework via their network activities profiles that will utilise the Blockchain technology

Due to the prevalence usage of the Internet, the amount of cybercrimes (such as email phishing, enterprise trade secret data theft, and password trafficking) has increased significantly over the last 10 years; it affects thousands of businesses around the world, costing them $13million per incident on average (Accenture, 2019). Forensic investigators are called to identify the source of attack and track down the offender by examining the network traffic log and computer systems. However due to the widely use of encrypted traffic, especially from Cyber criminals, this makes the forensic investigator’s job challenging if not impossible. Early research shows that it is possible to use the biometric technique (i.e. behaviour profiling) to identify individual via the metadata of their network traffic to a reasonable level of performance (Alotibi et al., 2016; Clarke et al., 2017); nonetheless, the features being used in their works are somewhat basic; also there is still plenty of room for improvement in the areas of classifiers and results. To this end, this project aims to identify and extract a specific user’s activities from the wider organisation’s traffic logs over a prolonged period by studying novel user’s network behaviour features and identify them by using deep learning method. The user’s activities identified will be converted to unique signatures and will be stored in the Blockchain technology (Kolokotronis et al., 2019; Brotsis et al., 2019), allowing forensic examiners, companies, and law enforcement agencies to detect malicious activities and track down individual offenders without violating GDPR and preserving user’s privacy (Gkotsopoulou et al., 2019).


References:
Accenture (2019) “Ninth Annual Cost of Cybercrime Study”, available at:
https://www.accenture.com/us-en/insights/security/cost-cybercrime-study

Clarke, N., Li, F., Furnell, S. (2017) “A novel privacy preserving user identification approach for network traffic”, Computers and Security, volume 70, page 315-350 DOI: 10.1016/j.cose.2017.06.012

Alotibi, G., Clarke, N., Li, F., & Furnell, S. (2016). User profiling from network traffic via novel application-level interactions. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 279-285). IEEE. DOI: 10.1109/ICITST.2016.7856712

Kolokotronis, N., Limniotis, K., Shiaeles, S., & Griffiths, R. (2019). Secured by Blockchain: Safeguarding Internet of Things Devices. IEEE Consumer Electronics Magazine, 8(3), 28-34. DOI: 10.1109/MCE.2019.2892221

Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., & Pavue, C. (2019). Blockchain solutions for forensic evidence preservation in IoT environments. 2019 IEEE Conference on Network Softwarization (NetSoft) DOI: 10.1109/NETSOFT.2019.8806675

Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., & Kolokotronis, N. (2019). Data Protection by Design for Cybersecurity Systems in a Smart Home Environment. In 2019 IEEE Conference on Network Softwarization (NetSoft) DOI: 10.1109/NETSOFT.2019.8806694


General admissions criteria
You’ll need an upper second class honours degree from an internationally recognised university or a Master’s degree in an appropriate subject. In exceptional cases, we may consider equivalent professional experience and/or qualifications. English language proficiency at a minimum of IELTS band 6.5 with no component score below 6.0.

Specific candidate requirements
You should have knowledge of programming (ideally python), deep learning/machine learning, Blockchain, networking protocols such as TCP/IP or UDP, Linux OS and biometrics.

How to Apply
We’d encourage you to contact Dr Fudong Li () to discuss your interest before you apply, quoting the project code.

When you are ready to apply, you can use our online application form. Make sure you submit a personal statement, proof of your degrees and grades, details of two referees, proof of your English language proficiency and an up-to-date CV. An extended statement as to how you might address the proposal would be welcomed.

Our ‘How to Apply’ page offers further guidance on the PhD application process.

If you want to be considered for this funded PhD opportunity you must quote project code COMP4520220 when applying.

Funding Notes

Candidates applying for this project may be eligible to compete for one of a small number of bursaries available; these cover tuition fees at the UK/EU rate for three years and a stipend in line with the UKRI rate (£15,009 for 2019/2020). Bursary recipients may be eligible for £1,500 for project costs/consumables.

Email Now

Insert previous message below for editing? 
You haven’t included a message. Providing a specific message means universities will take your enquiry more seriously and helps them provide the information you need.
Why not add a message here
* required field
Send a copy to me for my own records.

Your enquiry has been emailed successfully





FindAPhD. Copyright 2005-2020
All rights reserved.