Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches

被引:23
作者
Mbona, Innocent [1 ]
Eloff, Jan H. P. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ZA-0002 Pretoria, South Africa
关键词
Feature extraction; Telecommunication traffic; Computer security; Wireless networks; Protocols; Machine learning; Data models; Benford's law; cybersecurity; significant features; network intrusion detection system; network traffic analysis; machine learning; zero-day attack; BENFORDS LAW;
D O I
10.1109/ACCESS.2022.3187116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford's law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F-1 score of 85%) for detecting zero-day network attacks.
引用
收藏
页码:69822 / 69838
页数:17
相关论文
共 52 条
  • [1] Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset
    Abdalgawad, N.
    Sajun, A.
    Kaddoura, Y.
    Zualkernan, I. A.
    Aloul, F.
    [J]. IEEE ACCESS, 2022, 10 : 6430 - 6441
  • [2] Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection
    Abdulhammed, Razan
    Musafer, Hassan
    Alessa, Ali
    Faezipour, Miad
    Abuzneid, Abdelshakour
    [J]. ELECTRONICS, 2019, 8 (03)
  • [3] Abri F, 2019, IEEE INT CONF BIG DA, P3252, DOI 10.1109/BigData47090.2019.9006514
  • [4] Abu Taher K, 2019, 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), P643, DOI [10.1109/ICREST.2019.8644161, 10.1109/icrest.2019.8644161]
  • [5] Benford's Law in the Detection of DoS Attacks on Industrial Systems
    Aleksandrova, E. B.
    Lavrova, D. S.
    Yarmak, A. V.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 954 - 962
  • [6] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [7] Amoli T., 2016, INT J DIGITAL CONTEN, V10, P1
  • [8] Amr T, 2019, HANDS ON MACHINE LEA, P384
  • [9] Benford's law behavior of Internet traffic
    Arshadi, Laleh
    Jahangir, Amir Hossein
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 : 194 - 205
  • [10] Arunraj N. S., 2017, Anwendungen und Konzepte der Wirtschaftsinformatik, V20, P10