Zero-Day Threats Detection for Critical Infrastructures

被引:1
|
作者
Nkongolo, Mike [1 ]
Tokmak, Mahmut [2 ]
机构
[1] Univ Pretoria, ZA-0028 Hatfield, South Africa
[2] Mehmet Akif Ersoy Univ, Burdur, Turkey
关键词
Zero-day threats; Fuzzy logic; Feature selection; Machine learning; UGRansome; Critical infrastructures;
D O I
10.1007/978-3-031-39652-6_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase in the volume of information flowing through critical systems. As a result, protecting critical infrastructures from intrusions and security threats has become a paramount concern in the field of intrusion detection systems (IDS). To address this concern, this research paper focuses on the importance of defending critical infrastructures against intrusions and security threats. It proposes a computational framework that incorporates feature selection through fuzzification. The effectiveness and performance of the proposed framework are evaluated using the NSL-KDD and UGRansome datasets in combination with selected machine learning (ML) models. The findings of the study highlight the effectiveness of fuzzy logic and the use of ensemble learning to enhance the performance of ML models. The research identifies Random Forest (RF) and Extreme Gradient Boosting (XGB) as the topper-forming algorithms to detect zero-day attacks. The results obtained from the implemented computational framework outperform previous methods documented in the IDS literature, reaffirming the significance of safeguarding critical infrastructures from intrusions and security threats.
引用
收藏
页码:32 / 47
页数:16
相关论文
共 50 条
  • [21] Social Media Zero-Day Attack Detection Using TensorFlow
    Topcu, Ahmet Ercan
    Alzoubi, Yehia Ibrahim
    Elbasi, Ersin
    Camalan, Emre
    ELECTRONICS, 2023, 12 (17)
  • [22] ZERO-DAY WITHDRAWALS REEXAMINED
    不详
    JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, 2019, 255 (07): : 771 - 771
  • [23] A survey of zero-day malware attacks and its detection methodology
    Radhakrishnan, Kiran
    Menon, Rajeev R.
    Nath, Hiran V.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 533 - 539
  • [24] From zero-shot machine learning to zero-day attack detection
    Mohanad Sarhan
    Siamak Layeghy
    Marcus Gallagher
    Marius Portmann
    International Journal of Information Security, 2023, 22 : 947 - 959
  • [25] Deep Learning for Zero-day Malware Detection and Classification: A Survey
    Deldar, Fatemeh
    Abadi, Mahdi
    ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [26] From zero-shot machine learning to zero-day attack detection
    Sarhan, Mohanad
    Layeghy, Siamak
    Gallagher, Marcus
    Portmann, Marius
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 947 - 959
  • [27] Zero-Day Malware Classification and Detection Using Machine Learning
    Kumar J.
    Rajendran B.
    Sudarsan S.D.
    SN Computer Science, 5 (1)
  • [28] Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection
    Comar, Prakash Mandayam
    Liu, Lei
    Saha, Sabyasachi
    Tan, Pang-Ning
    Nucci, Antonio
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2022 - 2030
  • [29] Detection of Zero-day Malware Based on the Analysis of Opcode Sequences
    Zolotukhin, Mikhail
    Hamalainen, Timo
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [30] A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks
    AlEroud, Ahmed
    Karabatis, George
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 40 - 45