Detection of zero-day attacks: An unsupervised port-based approach

被引:32
|
作者
Blaise, Agathe [1 ,2 ]
Bouet, Mathieu [1 ]
Conan, Vania [1 ]
Secci, Stefano [3 ]
机构
[1] Thales, Gennevilliers, France
[2] Sorbonne Univ, LIP6 France, CNRS, Paris, France
[3] Cnam, Cedric, F-75003 Paris, France
关键词
NETWORK ANOMALY DETECTION; SCANS;
D O I
10.1016/j.comnet.2020.107391
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Last years have witnessed more and more DDoS attacks towards high-profile websites, as the Mirai botnet attack on September 2016, or more recently the memcached attack on March 2018, this time with no bother required. These two outbreaks were not detected nor mitigated during their spreading, but only at the time they happened. Such attacks are generally preceded by several stages, including infection of hosts or device fingerprinting; being able to capture this activity would allow their early detection. In this paper, we propose a technique for the early detection of emerging botnets and newly exploited vulnerabilities, which consists in (i) splitting the detection process over different network segments and retaining only distributed anomalies, (ii) monitoring at the port-level, with a simple yet efficient change-detection algorithm based on a modified Z-score measure. We argue how our technique, named Split-and-Merge, can ensure the detection of large-scale zero-day attacks and drastically reduce false positives. We apply the method on two datasets: the MAWI dataset, which provides daily traffic traces of a transpacific backbone link, and the UCSD Network Telescope dataset which contains unsolicited traffic mainly coming from botnet scans. The assumption of a normal distribution - for which the Z-score computation makes sense - is verified through empirical measures. We also show how the solution generates very few alerts; an extensive evaluation on the last three years allows identifying major attacks (including Mirai and memcached) that current Intrusion Detection Systems (IDSs) have not seen. Finally, we classify detected known and unknown anomalies to give additional insights about them.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Detection of Zero-day Attacks on IoT
    Reardon, Shay
    Hssayeni, Murtadha D.
    Mahgoub, Imadeldin
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [2] An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks
    Roopak, Monika
    Parkinson, Simon
    Tian, Gui Yun
    Ran, Yachao
    Khan, Saad
    Chandrasekaran, Balasubramaniyan
    [J]. IET NETWORKS, 2024, : 513 - 527
  • [3] A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks
    AlEroud, Ahmed
    Karabatis, George
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 40 - 45
  • [4] Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    [J]. IEEE ACCESS, 2021, 9 : 90603 - 90615
  • [5] A Brief Review of Unsupervised Learning Algorithms for Zero-Day Attacks in Intrusion Detection Systems
    Oluwadare, Sunkanmi
    ElSayed, Zag
    Adekoya, Oluwaseun
    [J]. 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [6] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [7] An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks
    Azzedin, Farag
    Suwad, Husam
    Rahman, Md Mahfuzur
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3003 - 3020
  • [8] Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
    Ibrahim Hairab, Belal
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. ELECTRONICS, 2023, 12 (03)
  • [9] A Reinforcement Learning-Based Approach for Detection Zero-Day Malware Attacks on IoT System
    Ngo, Quoc-Dung
    Nguyen, Quoc-Huu
    [J]. ARTIFICIAL INTELLIGENCE TRENDS IN SYSTEMS, VOL 2, 2022, 502 : 381 - 394
  • [10] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    [J]. ELECTRONICS, 2022, 11 (23)