Zero-Day Threats Detection for Critical Infrastructures

被引:1
|
作者
Nkongolo, Mike [1 ]
Tokmak, Mahmut [2 ]
机构
[1] Univ Pretoria, ZA-0028 Hatfield, South Africa
[2] Mehmet Akif Ersoy Univ, Burdur, Turkey
关键词
Zero-day threats; Fuzzy logic; Feature selection; Machine learning; UGRansome; Critical infrastructures;
D O I
10.1007/978-3-031-39652-6_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase in the volume of information flowing through critical systems. As a result, protecting critical infrastructures from intrusions and security threats has become a paramount concern in the field of intrusion detection systems (IDS). To address this concern, this research paper focuses on the importance of defending critical infrastructures against intrusions and security threats. It proposes a computational framework that incorporates feature selection through fuzzification. The effectiveness and performance of the proposed framework are evaluated using the NSL-KDD and UGRansome datasets in combination with selected machine learning (ML) models. The findings of the study highlight the effectiveness of fuzzy logic and the use of ensemble learning to enhance the performance of ML models. The research identifies Random Forest (RF) and Extreme Gradient Boosting (XGB) as the topper-forming algorithms to detect zero-day attacks. The results obtained from the implemented computational framework outperform previous methods documented in the IDS literature, reaffirming the significance of safeguarding critical infrastructures from intrusions and security threats.
引用
收藏
页码:32 / 47
页数:16
相关论文
共 50 条
  • [31] Efficient content-based detection of zero-day worms
    Akritidis, P
    Anagnostakis, K
    Markatos, EP
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 837 - 843
  • [32] An NIDS for Known and Zero-Day Anomalies
    Hussain, A.
    Aguilo-Gost, F.
    Simo-Mezquita, E.
    Marin-Tordera, E.
    Massip, X.
    2023 19TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN, 2023,
  • [33] Benchmarking LLM for Zero-day Vulnerabilities
    Lisha, M.
    Agarwal, Vedika
    Kamthania, Supriya
    Vutkur, Pranav
    Chari, Madhusoodhana S.
    10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
  • [34] An Adaptive Real-Time Architecture for Zero-Day Threat Detection
    Pastana Lobato, Antonio Gonzalez
    Lopez, Martin Andreoni
    Sanz, Igor Jochem
    Cardenas, Alvaro A.
    Duarte, Otto Carlos M. B.
    Pujolle, Guy
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [35] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    COMPUTER NETWORKS, 2020, 180 (180)
  • [36] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [37] IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT
    Ellouh, Mahmoud
    Ghaleb, Mustafa
    Felemban, Muhamad
    Proceedings - 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022, 2022, : 765 - 771
  • [38] Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture
    Kim, Chiho
    Chang, Sang-Yoon
    Kim, Jonghyun
    Lee, Dongeun
    Kim, Jinoh
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3900 - 3914
  • [39] Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
    Ibrahim Hairab, Belal
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    ELECTRONICS, 2023, 12 (03)
  • [40] Zero-Day Attack Detection and Prevention in Software-Defined Networks
    Al-Rushdan, Huthifh
    Shurman, Mohammad
    Alnabelsi, Sharhabeel H.
    Althebyan, Qutaibah
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 278 - 282