Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches

被引:18
|
作者
Mbona, Innocent [1 ]
Eloff, Jan H. P. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ZA-0002 Pretoria, South Africa
关键词
Feature extraction; Telecommunication traffic; Computer security; Wireless networks; Protocols; Machine learning; Data models; Benford's law; cybersecurity; significant features; network intrusion detection system; network traffic analysis; machine learning; zero-day attack; BENFORDS LAW;
D O I
10.1109/ACCESS.2022.3187116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford's law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F-1 score of 85%) for detecting zero-day network attacks.
引用
下载
收藏
页码:69822 / 69838
页数:17
相关论文
共 50 条
  • [21] Optimization approaches for semi-supervised learning
    Yajima, Y
    Hoshiba, T
    ICMLA 2005: FOURTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2005, : 247 - 252
  • [22] Optimization approaches to semi-supervised learning
    Demiriz, A
    Bennett, KP
    COMPLEMENTARITY: APPLICATIONS, ALGORITHMS AND EXTENSIONS, 2001, 50 : 121 - 141
  • [23] Detecting Cyber Attacks in Smart Grids Using Semi-Supervised Anomaly Detection and Deep Representation Learning
    Qi, Ruobin
    Rasband, Craig
    Zheng, Jun
    Longoria, Raul
    INFORMATION, 2021, 12 (08)
  • [24] Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection
    Comar, Prakash Mandayam
    Liu, Lei
    Saha, Sabyasachi
    Tan, Pang-Ning
    Nucci, Antonio
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2022 - 2030
  • [25] A Novel Distributed Machine Learning Framework for Semi-Supervised Detection of Botnet Attacks
    Kaur, Gagandeep
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 233 - 239
  • [26] Detecting Research from an Uncurated HTML']HTML Archive Using Semi-Supervised Machine Learning
    McNulty, John
    Alvarez, Sarai
    Langmayr, Michael
    2021 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (IEEE SIEDS 2021), 2021, : 249 - 254
  • [27] Lagrangian supervised and semi-supervised extreme learning machine
    Ma, Jun
    Wen, Yakun
    Yang, Liming
    APPLIED INTELLIGENCE, 2019, 49 (02) : 303 - 318
  • [28] Lagrangian supervised and semi-supervised extreme learning machine
    Jun Ma
    Yakun Wen
    Liming Yang
    Applied Intelligence, 2019, 49 : 303 - 318
  • [29] Detecting malicious URLs. A semi-supervised machine learning system approach
    Gabriel, Anton Dan
    Gavrilut, Dragos Teodor
    Alexandru, Baetu Ioan
    Stefan, Popescu Adrian
    PROCEEDINGS OF 2016 18TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 233 - 239
  • [30] Semi-Supervised Learning Methods for Network Intrusion Detection
    Chen, Chuanliang
    Gong, Yunchao
    Tian, Yingjie
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 2602 - +