Zero-Day Threats Detection for Critical Infrastructures

被引:3
作者
Nkongolo, Mike [1 ]
Tokmak, Mahmut [2 ]
机构
[1] Univ Pretoria, ZA-0028 Hatfield, South Africa
[2] Mehmet Akif Ersoy Univ, Burdur, Turkiye
来源
SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS, SAICSIT 2023 | 2023年 / 1878卷
关键词
Zero-day threats; Fuzzy logic; Feature selection; Machine learning; UGRansome; Critical infrastructures;
D O I
10.1007/978-3-031-39652-6_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase in the volume of information flowing through critical systems. As a result, protecting critical infrastructures from intrusions and security threats has become a paramount concern in the field of intrusion detection systems (IDS). To address this concern, this research paper focuses on the importance of defending critical infrastructures against intrusions and security threats. It proposes a computational framework that incorporates feature selection through fuzzification. The effectiveness and performance of the proposed framework are evaluated using the NSL-KDD and UGRansome datasets in combination with selected machine learning (ML) models. The findings of the study highlight the effectiveness of fuzzy logic and the use of ensemble learning to enhance the performance of ML models. The research identifies Random Forest (RF) and Extreme Gradient Boosting (XGB) as the topper-forming algorithms to detect zero-day attacks. The results obtained from the implemented computational framework outperform previous methods documented in the IDS literature, reaffirming the significance of safeguarding critical infrastructures from intrusions and security threats.
引用
收藏
页码:32 / 47
页数:16
相关论文
共 15 条
[1]   Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives [J].
Javaheri, Danial ;
Gorgin, Saeid ;
Lee, Jeong-A ;
Masdari, Mohammad .
INFORMATION SCIENCES, 2023, 626 :315-338
[2]  
Kasongo S.M., 2021, PREPRINT
[3]  
Maglaras L., 2022, COMBINING SECURITY R, P10387
[4]  
Nkongolo M., 2023, LNNS, P543, DOI [10.1007/978-981-19-4960-9_43, DOI 10.1007/978-981-19-4960-9_43]
[5]  
Nkongolo M., 2023, Lecture Notes on Data Engineering and Communications Technologies, P547, DOI [10.1007/978-981-19-3035-5_41, DOI 10.1007/978-981-19-3035-5_41]
[6]   A Cloud Based Optimization Method for Zero-Day Threats Detection Using Genetic Algorithm and Ensemble Learning [J].
Nkongolo, Mike ;
Van Deventer, Jacobus Philippus ;
Kasongo, Sydney Mambwe ;
Zahra, Syeda Rabab ;
Kipongo, Joseph .
ELECTRONICS, 2022, 11 (11)
[7]   UGRansome1819: A Novel Dataset for Anomaly Detection and Zero-Day Threats [J].
Nkongolo, Mike ;
van Deventer, Jacobus Philippus ;
Kasongo, Sydney Mambwe .
INFORMATION, 2021, 12 (10)
[8]  
Lobato AGP, 2018, IEEE ICC
[9]   A Free and Community-Driven Critical Infrastructure Ransomware Dataset [J].
Rege, Aunshul ;
Bleiman, Rachel .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, :25-37
[10]   Discovering computer networks intrusion using data analytics and machine intelligence [J].
Sarumi, Oluwafemi A. ;
Adetunmbi, Adebayo O. ;
Adetoye, Fadekemi A. .
SCIENTIFIC AFRICAN, 2020, 9