Detection of Zero-day Attacks on IoT

被引:0
|
作者
Reardon, Shay [1 ]
Hssayeni, Murtadha D. [1 ]
Mahgoub, Imadeldin [1 ]
机构
[1] Florida Atlantic Univ, Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
intrusion detection system; zero-day attacks; IoT; IoBT; machine learning;
D O I
10.1109/SMARTNETS61466.2024.10577735
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Zero-day attacks are cybersecurity attacks that seek to exploit an unknown vulnerability in Internet of Things (IoT). This makes zero-day attacks inherently difficult to detect and costly to network administrators. Current methods of detection utilize machine learning methodologies for intrusion detection. However, these methods suffer from low performance in specific zero-day attacks. This study proposes novel features built upon network flow and raw packet data aiming to detect zero-day attacks. Our testing approach utilizes fix traditional machine learning algorithms (Decision Tree (DT), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Logistic Regression (LR), Gaussian Naive Bayes (NB), and Random Forest (RF)) with split-at-scenario cross-validation. We find that our engineered features achieve consistent high detection rates with three models (DT, SVM, and RF), whereas these models fail to detect at least one of the attacks when using raw features. Our results display potential for utilizing the proposed flow-based complex features to detect unknown network attacks with Internet of Battle Things (IoBT) applications.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
    Sharma, Vishal
    Lee, Kyungroul
    Kwon, Soonhyun
    Kim, Jiyoon
    Park, Hyungjoon
    Yim, Kangbin
    Lee, Sun-Young
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [2] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [3] A Reinforcement Learning-Based Approach for Detection Zero-Day Malware Attacks on IoT System
    Ngo, Quoc-Dung
    Nguyen, Quoc-Huu
    [J]. ARTIFICIAL INTELLIGENCE TRENDS IN SYSTEMS, VOL 2, 2022, 502 : 381 - 394
  • [4] A survey of zero-day malware attacks and its detection methodology
    Radhakrishnan, Kiran
    Menon, Rajeev R.
    Nath, Hiran V.
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 533 - 539
  • [5] A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks
    AlEroud, Ahmed
    Karabatis, George
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 40 - 45
  • [6] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [7] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    [J]. COMPUTER NETWORKS, 2020, 180
  • [8] Zero-Day Malware Detection
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjccv
    [J]. 2016 SIXTH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2016), 2016, : 171 - 175
  • [9] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [10] RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT
    Huertas Celdran, Alberto
    Sanchez Sanchez, Pedro Miguel
    von der Assen, Jan
    Schenk, Timo
    Bovet, Gerome
    Martinez Perez, Gregorio
    Stiller, Burkhard
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5520 - 5529