Zero-Day Threats Detection for Critical Infrastructures

被引:1
|
作者
Nkongolo, Mike [1 ]
Tokmak, Mahmut [2 ]
机构
[1] Univ Pretoria, ZA-0028 Hatfield, South Africa
[2] Mehmet Akif Ersoy Univ, Burdur, Turkey
关键词
Zero-day threats; Fuzzy logic; Feature selection; Machine learning; UGRansome; Critical infrastructures;
D O I
10.1007/978-3-031-39652-6_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase in the volume of information flowing through critical systems. As a result, protecting critical infrastructures from intrusions and security threats has become a paramount concern in the field of intrusion detection systems (IDS). To address this concern, this research paper focuses on the importance of defending critical infrastructures against intrusions and security threats. It proposes a computational framework that incorporates feature selection through fuzzification. The effectiveness and performance of the proposed framework are evaluated using the NSL-KDD and UGRansome datasets in combination with selected machine learning (ML) models. The findings of the study highlight the effectiveness of fuzzy logic and the use of ensemble learning to enhance the performance of ML models. The research identifies Random Forest (RF) and Extreme Gradient Boosting (XGB) as the topper-forming algorithms to detect zero-day attacks. The results obtained from the implemented computational framework outperform previous methods documented in the IDS literature, reaffirming the significance of safeguarding critical infrastructures from intrusions and security threats.
引用
收藏
页码:32 / 47
页数:16
相关论文
共 50 条
  • [1] Zero-Day Malware Detection
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjccv
    2016 SIXTH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2016), 2016, : 171 - 175
  • [2] UGRansome1819: A Novel Dataset for Anomaly Detection and Zero-Day Threats
    Nkongolo, Mike
    van Deventer, Jacobus Philippus
    Kasongo, Sydney Mambwe
    INFORMATION, 2021, 12 (10)
  • [3] Detection of Zero-day Attacks on IoT
    Reardon, Shay
    Hssayeni, Murtadha D.
    Mahgoub, Imadeldin
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [4] Mitigation and Detection of Zero-Day Vulnerabilities
    Sebastian Guisao, Juan
    Toro Rendon, Juan Carlos
    CUADERNO ACTIVA, 2014, (06): : 63 - 67
  • [5] A framework for zero-day vulnerabilities detection and prioritization
    Singh, Umesh Kumar
    Joshi, Chanchala
    Kanellopoulos, Dimitris
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 164 - 172
  • [6] Cyber Disarmament Treaties and the Failure to Consider Adequately Zero-Day Threats
    Baer, Merritt
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 255 - 258
  • [7] A Cloud Based Optimization Method for Zero-Day Threats Detection Using Genetic Algorithm and Ensemble Learning
    Nkongolo, Mike
    Van Deventer, Jacobus Philippus
    Kasongo, Sydney Mambwe
    Zahra, Syeda Rabab
    Kipongo, Joseph
    ELECTRONICS, 2022, 11 (11)
  • [8] Abnormal Behavioral Pattern Detection in Closed-Loop Robotic Systems for Zero-Day Deceptive Threats
    Gorbenko, Anna
    Popov, Vladimir
    2020 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2020,
  • [9] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [10] The Zero-Day Salesmen
    Greenberg, Andy
    FORBES, 2012, 189 (06): : 40 - +