Detecting Zero-day Attack with Federated Learning using Autonomously Extracted Anomalies in IoT

被引:1
|
作者
Ohtani, Takahiro [1 ]
Yamamoto, Ryo [1 ]
Ohzahata, Satoshi [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
关键词
IoT; Network; Security; Intrusion detection; Zero-day attacks; Federated learning; Machine learning;
D O I
10.1109/CCNC51664.2024.10454669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) has become an essential element of our daily lives. However, IoT devices used in IoT environments have limited available resources due to power and cost constraints, and this fact makes it difficult to implement advanced security measures on them. In fact, zero-day attacks targeting vulnerable IoT devices have occurred, and introducing an anomaly-based intrusion detection system (IDS) that can detect zero-day attacks is one of the countermeasures against the attacks. However, existing methods still suffer from limited detection ability due to a lack of training data. To solve this problem, this paper proposes an intrusion detection method that aggregates zero-day and false positive (FP) attack candidates extracted by an unsupervised anomaly detection algorithm using a one-class classification algorithm and FL. The detection performance evaluation confirms that the proposed method can share the autonomously detected zero-day attacks among IoT networks while suppressing FPs generated during the candidate extraction process.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 50 条
  • [21] An active learning framework using deep Q-network for zero-day attack detection
    Wu, Yali
    Hu, Yanghu
    Wang, Junhu
    Feng, Mengqi
    Dong, Ang
    Yang, Yanxi
    COMPUTERS & SECURITY, 2024, 139
  • [22] A Zero-Day Cloud Timing Channel Attack
    Flowers, Robert
    IEEE ACCESS, 2022, 10 : 128177 - 128186
  • [23] Detecting Zero-day Polymorphic Worm: A Review
    Sulieman, Sulieman Mohamed Ali
    Fadlalla, Yahia A.
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [24] Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2506 - 2521
  • [25] Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
    Mbona, Innocent
    Eloff, Jan H. P.
    IEEE ACCESS, 2022, 10 : 69822 - 69838
  • [26] Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT
    Verma, Priyanka
    Bharot, Nitesh
    Breslin, John G.
    O'Shea, Donna
    Vidyarthi, Ankit
    Gupta, Deepak
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3856 - 3866
  • [27] Zero-day Attack Identification in Streaming data using Semantics and Spark
    Pallaprolu, Sai C.
    Sankineni, Rishi
    Thevar, Muthukumar
    Karabatis, George
    Wang, Jianwu
    2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 121 - 128
  • [28] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    COMPUTERS & SECURITY, 2022, 120
  • [29] Federated Incremental Learning based Evolvable Intrusion Detection System for Zero-Day Attacks
    Jin, Dong
    Chen, Shuangwu
    He, Huasen
    Jiang, Xiaofeng
    Cheng, Siyu
    Yang, Jian
    IEEE NETWORK, 2023, 37 (01): : 125 - 132
  • [30] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811