Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches

被引:18
|
作者
Mbona, Innocent [1 ]
Eloff, Jan H. P. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ZA-0002 Pretoria, South Africa
关键词
Feature extraction; Telecommunication traffic; Computer security; Wireless networks; Protocols; Machine learning; Data models; Benford's law; cybersecurity; significant features; network intrusion detection system; network traffic analysis; machine learning; zero-day attack; BENFORDS LAW;
D O I
10.1109/ACCESS.2022.3187116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford's law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F-1 score of 85%) for detecting zero-day network attacks.
引用
收藏
页码:69822 / 69838
页数:17
相关论文
共 50 条
  • [41] Approaches to semi-supervised learning of fuzzy classifiers
    Klose, A
    [J]. KI 2003: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2003, 2821 : 436 - 449
  • [42] Efficiently detecting overlapping communities using seeding and semi-supervised learning
    Changxing Shang
    Shengzhong Feng
    Zhongying Zhao
    Jianping Fan
    [J]. International Journal of Machine Learning and Cybernetics, 2017, 8 : 455 - 468
  • [43] Detecting zero-day attacks using context-aware anomaly detection at the application-layer
    Patrick Duessel
    Christian Gehl
    Ulrich Flegel
    Sven Dietrich
    Michael Meier
    [J]. International Journal of Information Security, 2017, 16 : 475 - 490
  • [44] Semi-supervised Convolutional Extreme Learning Machine
    Yousefi-Azar, Mahmood
    McDonnell, Mark D.
    [J]. 2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, : 1968 - 1974
  • [45] Semi-Supervised Learning for Neural Machine Translation
    Cheng, Yong
    Xu, Wei
    He, Zhongjun
    He, Wei
    Wu, Hua
    Sun, Maosong
    Liu, Yang
    [J]. PROCEEDINGS OF THE 54TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, VOL 1, 2016, : 1965 - 1974
  • [46] Robust semi-supervised extreme learning machine
    Pei, Huimin
    Wang, Kuaini
    Lin, Qiang
    Zhong, Ping
    [J]. KNOWLEDGE-BASED SYSTEMS, 2018, 159 : 203 - 220
  • [47] Detecting Zero-day Attack with Federated Learning using Autonomously Extracted Anomalies in IoT
    Ohtani, Takahiro
    Yamamoto, Ryo
    Ohzahata, Satoshi
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 356 - 359
  • [48] Hessian semi-supervised extreme learning machine
    Krishnasamy, Ganesh
    Paramesran, Raveendran
    [J]. NEUROCOMPUTING, 2016, 207 : 560 - 567
  • [49] Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach
    Zhang, Ying
    Wang, Jianhui
    Chen, Bo
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) : 623 - 634
  • [50] From zero-shot machine learning to zero-day attack detection
    Mohanad Sarhan
    Siamak Layeghy
    Marcus Gallagher
    Marius Portmann
    [J]. International Journal of Information Security, 2023, 22 : 947 - 959