Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches

被引:18
|
作者
Mbona, Innocent [1 ]
Eloff, Jan H. P. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ZA-0002 Pretoria, South Africa
关键词
Feature extraction; Telecommunication traffic; Computer security; Wireless networks; Protocols; Machine learning; Data models; Benford's law; cybersecurity; significant features; network intrusion detection system; network traffic analysis; machine learning; zero-day attack; BENFORDS LAW;
D O I
10.1109/ACCESS.2022.3187116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford's law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F-1 score of 85%) for detecting zero-day network attacks.
引用
收藏
页码:69822 / 69838
页数:17
相关论文
共 50 条
  • [31] Enabling semi-supervised learning in intrusion detection systems
    Sarantos, Panagis
    Violos, John
    Leivadeas, Aris
    Journal of Parallel and Distributed Computing, 2025, 196
  • [32] Building energy modeling (BEM) using clustering algorithms and semi-supervised machine learning approaches
    Naganathan, Hariharan
    Chong, Wai Oswald
    Chen, Xuewen
    AUTOMATION IN CONSTRUCTION, 2016, 72 : 187 - 194
  • [33] Mineral Prospectivity Mapping Using Semi-supervised Machine Learning
    Quanke Li
    Guoxiong Chen
    Detao Wang
    Mathematical Geosciences, 2025, 57 (2) : 275 - 305
  • [34] MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System
    Yao, Haipeng
    Fu, Danyang
    Zhang, Peiying
    Li, Maozhen
    Liu, Yunjie
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1949 - 1959
  • [35] Contaminant source identification using semi-supervised machine learning
    Vesselinov, Velimir V.
    Alexandrov, Boian S.
    O'Malley, Daniel
    JOURNAL OF CONTAMINANT HYDROLOGY, 2018, 212 : 134 - 142
  • [36] Driver Distraction Detection Using Semi-Supervised Machine Learning
    Liu, Tianchi
    Yang, Yan
    Huang, Guang-Bin
    Yeo, Yong Kiang
    Lin, Zhiping
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (04) : 1108 - 1120
  • [37] Efficiently detecting overlapping communities using seeding and semi-supervised learning
    Shang, Changxing
    Feng, Shengzhong
    Zhao, Zhongying
    Fan, Jianping
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2017, 8 (02) : 455 - 468
  • [38] Detecting Malicious PDF Files Using Semi-Supervised Learning Method
    Feng, Di
    Yu, Min
    Wang, Yongjian
    Liu, Chao
    Ma, Chunguang
    5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT 2017), 2017, : 1 - 9
  • [39] Spectral Transformation Approaches To Semi-supervised Learning
    Hu, Chonghai
    Wang, Chengqun
    Liu, Kangsheng
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2008, : 207 - +
  • [40] Approaches to semi-supervised learning of fuzzy classifiers
    Klose, A
    KI 2003: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2003, 2821 : 436 - 449