Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches

被引:18
|
作者
Mbona, Innocent [1 ]
Eloff, Jan H. P. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ZA-0002 Pretoria, South Africa
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Feature extraction; Telecommunication traffic; Computer security; Wireless networks; Protocols; Machine learning; Data models; Benford's law; cybersecurity; significant features; network intrusion detection system; network traffic analysis; machine learning; zero-day attack; BENFORDS LAW;
D O I
10.1109/ACCESS.2022.3187116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford's law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F-1 score of 85%) for detecting zero-day network attacks.
引用
收藏
页码:69822 / 69838
页数:17
相关论文
共 50 条
  • [1] An intrusion detection model to detect zero-day attacks in unseen data using machine learning
    Dai, Zhen
    Por, Lip Yee
    Chen, Yen-Lin
    Yang, Jing
    Ku, Chin Soon
    Alizadehsani, Roohallah
    Plawiak, Pawel
    [J]. PLOS ONE, 2024, 19 (09):
  • [2] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    [J]. 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [3] DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING
    Jiang, Jianguo
    Song, Nan
    Yu, Min
    Chow, Kam-Pui
    Li, Gang
    Liu, Chao
    Huang, Weiqing
    [J]. ADVANCES IN DIGITAL FORENSICS XVII, 2021, 612 : 135 - 155
  • [4] Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning
    Yau, Ken
    Chow, K. P.
    Yiu, S. M.
    Chan, C. F.
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 580 - 585
  • [5] Exploration of the Semi-Supervised Learning Approach for Detecting Phishing Attacks
    Jeevan, Vignesh
    Refonaa, J.
    Shaurya, Suraj
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 138 - 143
  • [6] ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques
    Alhaidari, Fahd
    Shaib, Nouran Abu
    Alsafi, Maram
    Alharbi, Haneen
    Alawami, Majd
    Aljindan, Reem
    Rahman, Atta-ur
    Zagrouba, Rachid
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [7] Predicting Unlabeled Traffic For Intrusion Detection Using Semi-Supervised Machine Learning
    Murthy, Chidananda P.
    Manjunatha, A. S.
    Jaiswal, Anku
    Madhu, B. R.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 218 - 222
  • [8] Semi-supervised machine learning framework for network intrusion detection
    Jieling Li
    Hao Zhang
    Yanhua Liu
    Zhihuang Liu
    [J]. The Journal of Supercomputing, 2022, 78 : 13122 - 13144
  • [9] Semi-supervised machine learning framework for network intrusion detection
    Li, Jieling
    Zhang, Hao
    Liu, Yanhua
    Liu, Zhihuang
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (11): : 13122 - 13144
  • [10] An adaptable deep learning-based intrusion detection system to zero-day attacks
    Soltani, Mahdi
    Ousat, Behzad
    Siavoshani, Mahdi Jafari
    Jahangir, Amir Hossein
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76