Detecting zero-day intrusion attacks using semi-supervised machine learning approaches

dc.contributor.authorMbona, Innocent
dc.contributor.authorEloff, Jan H.P.
dc.contributor.emailu15256422@tuks.co.zaen_US
dc.date.accessioned2022-11-22T09:41:54Z
dc.date.available2022-11-22T09:41:54Z
dc.date.issued2022-06-29
dc.description.abstractRecently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learning (ML) based network intrusion detection systems (NIDS) by monitoring and extracting meaningful information from network traffic data. Network traffic data constitute large volumes of data described by features such as destination-to-source packet count. It is important to use only those features that have a significant impact on the performance of an NIDS. The problem is that most existing ML models for NIDS employ features such as Internet protocol (IP) addresses that are redundant for detecting zero-day attacks and therefore negatively impact the performance of these ML models. The solution proposed in this study demonstrates that the law of anomalous numbers, famously known as Benford’s law, is a viable technique that can effectively identify significant network features that are indicative of anomalous behaviour and can be used for detecting zero-day attacks. Finally, our study illustrates that semi-supervised ML approaches are effective for detecting zero-day attacks if significant features are optimally chosen. The experimental results demonstrate that one-class support vector machines achieved the best results (Matthews correlation coefficient of 74% and F1 score of 85%) for detecting zero-day network attacks.en_US
dc.description.departmentComputer Scienceen_US
dc.description.urihttps://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639en_US
dc.identifier.citationI. Mbona and J. H. P. Eloff, "Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches," in IEEE Access, vol. 10, pp. 69822-69838, 2022, doi: 10.1109/ACCESS.2022.3187116.en_US
dc.identifier.issn2169-3536 (online)
dc.identifier.other10.1109/ACCESS.2022.3187116
dc.identifier.urihttps://repository.up.ac.za/handle/2263/88421
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rightsThis work is licensed under a Creative Commons Attribution 4.0 License.en_US
dc.subjectFeature extractionen_US
dc.subjectTelecommunication trafficen_US
dc.subjectComputer securityen_US
dc.subjectWireless networksen_US
dc.subjectProtocolsen_US
dc.subjectMachine learningen_US
dc.subjectData modelsen_US
dc.subjectNetwork intrusion detection systems (NIDS)en_US
dc.titleDetecting zero-day intrusion attacks using semi-supervised machine learning approachesen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Mbona_Detecting_2022.pdf
Size:
4.23 MB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: