Detection of Zero-day Attacks on IoT

被引:0
|
作者
Reardon, Shay [1 ]
Hssayeni, Murtadha D. [1 ]
Mahgoub, Imadeldin [1 ]
机构
[1] Florida Atlantic Univ, Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
intrusion detection system; zero-day attacks; IoT; IoBT; machine learning;
D O I
10.1109/SMARTNETS61466.2024.10577735
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Zero-day attacks are cybersecurity attacks that seek to exploit an unknown vulnerability in Internet of Things (IoT). This makes zero-day attacks inherently difficult to detect and costly to network administrators. Current methods of detection utilize machine learning methodologies for intrusion detection. However, these methods suffer from low performance in specific zero-day attacks. This study proposes novel features built upon network flow and raw packet data aiming to detect zero-day attacks. Our testing approach utilizes fix traditional machine learning algorithms (Decision Tree (DT), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Logistic Regression (LR), Gaussian Naive Bayes (NB), and Random Forest (RF)) with split-at-scenario cross-validation. We find that our engineered features achieve consistent high detection rates with three models (DT, SVM, and RF), whereas these models fail to detect at least one of the attacks when using raw features. Our results display potential for utilizing the proposed flow-based complex features to detect unknown network attacks with Internet of Battle Things (IoBT) applications.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT
    Ellouh, Mahmoud
    Ghaleb, Mustafa
    Felemban, Muhamad
    [J]. Proceedings - 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022, 2022, : 765 - 771
  • [2] A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
    Sharma, Vishal
    Lee, Kyungroul
    Kwon, Soonhyun
    Kim, Jiyoon
    Park, Hyungjoon
    Yim, Kangbin
    Lee, Sun-Young
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [3] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [4] A Reinforcement Learning-Based Approach for Detection Zero-Day Malware Attacks on IoT System
    Ngo, Quoc-Dung
    Nguyen, Quoc-Huu
    [J]. ARTIFICIAL INTELLIGENCE TRENDS IN SYSTEMS, VOL 2, 2022, 502 : 381 - 394
  • [5] A survey of zero-day malware attacks and its detection methodology
    Radhakrishnan, Kiran
    Menon, Rajeev R.
    Nath, Hiran V.
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 533 - 539
  • [6] A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks
    AlEroud, Ahmed
    Karabatis, George
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 40 - 45
  • [7] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [8] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    [J]. COMPUTER NETWORKS, 2020, 180 (180)
  • [9] RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT
    Huertas Celdran, Alberto
    Sanchez Sanchez, Pedro Miguel
    von der Assen, Jan
    Schenk, Timo
    Bovet, Gerome
    Martinez Perez, Gregorio
    Stiller, Burkhard
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5520 - 5529
  • [10] Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
    Ibrahim Hairab, Belal
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. ELECTRONICS, 2023, 12 (03)