Detecting zero-day intrusion attacks using semi-supervised machine learning approaches

Show simple item record

dc.contributor.author Mbona, Innocent
dc.contributor.author Eloff, Jan H.P.
dc.date.accessioned 2022-11-22T09:41:54Z
dc.date.available 2022-11-22T09:41:54Z
dc.date.issued 2022-06-29
dc.description.abstract Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford’s law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F1 score of 85%) for detecting zero-day network attacks. en_US
dc.description.department Computer Science en_US
dc.description.uri https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 en_US
dc.identifier.citation I. Mbona and J. H. P. Eloff, "Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches," in IEEE Access, vol. 10, pp. 69822-69838, 2022, doi: 10.1109/ACCESS.2022.3187116. en_US
dc.identifier.issn 2169-3536 (online)
dc.identifier.other 10.1109/ACCESS.2022.3187116
dc.identifier.uri https://repository.up.ac.za/handle/2263/88421
dc.language.iso en en_US
dc.publisher Institute of Electrical and Electronics Engineers en_US
dc.rights This work is licensed under a Creative Commons Attribution 4.0 License. en_US
dc.subject Feature extraction en_US
dc.subject Telecommunication traffic en_US
dc.subject Computer security en_US
dc.subject Wireless networks en_US
dc.subject Protocols en_US
dc.subject Machine learning en_US
dc.subject Data models en_US
dc.subject Network intrusion detection systems (NIDS) en_US
dc.title Detecting zero-day intrusion attacks using semi-supervised machine learning approaches en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record