dc.contributor.author |
Mbona, Innocent
|
|
dc.contributor.author |
Eloff, Jan H.P.
|
|
dc.date.accessioned |
2022-11-22T09:41:54Z |
|
dc.date.available |
2022-11-22T09:41:54Z |
|
dc.date.issued |
2022-06-29 |
|
dc.description.abstract |
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford’s law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F1 score of 85%) for detecting zero-day network attacks. |
en_US |
dc.description.department |
Computer Science |
en_US |
dc.description.uri |
https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 |
en_US |
dc.identifier.citation |
I. Mbona and J. H. P. Eloff, "Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches," in IEEE Access, vol. 10, pp. 69822-69838, 2022, doi: 10.1109/ACCESS.2022.3187116. |
en_US |
dc.identifier.issn |
2169-3536 (online) |
|
dc.identifier.other |
10.1109/ACCESS.2022.3187116 |
|
dc.identifier.uri |
https://repository.up.ac.za/handle/2263/88421 |
|
dc.language.iso |
en |
en_US |
dc.publisher |
Institute of Electrical and Electronics Engineers |
en_US |
dc.rights |
This work is licensed under a Creative Commons Attribution 4.0 License. |
en_US |
dc.subject |
Feature extraction |
en_US |
dc.subject |
Telecommunication traffic |
en_US |
dc.subject |
Computer security |
en_US |
dc.subject |
Wireless networks |
en_US |
dc.subject |
Protocols |
en_US |
dc.subject |
Machine learning |
en_US |
dc.subject |
Data models |
en_US |
dc.subject |
Network intrusion detection systems (NIDS) |
en_US |
dc.title |
Detecting zero-day intrusion attacks using semi-supervised machine learning approaches |
en_US |
dc.type |
Article |
en_US |