Detecting Zero-day Attack with Federated Learning using Autonomously Extracted Anomalies in IoT

被引:1
|
作者
Ohtani, Takahiro [1 ]
Yamamoto, Ryo [1 ]
Ohzahata, Satoshi [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
关键词
IoT; Network; Security; Intrusion detection; Zero-day attacks; Federated learning; Machine learning;
D O I
10.1109/CCNC51664.2024.10454669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) has become an essential element of our daily lives. However, IoT devices used in IoT environments have limited available resources due to power and cost constraints, and this fact makes it difficult to implement advanced security measures on them. In fact, zero-day attacks targeting vulnerable IoT devices have occurred, and introducing an anomaly-based intrusion detection system (IDS) that can detect zero-day attacks is one of the countermeasures against the attacks. However, existing methods still suffer from limited detection ability due to a lack of training data. To solve this problem, this paper proposes an intrusion detection method that aggregates zero-day and false positive (FP) attack candidates extracted by an unsupervised anomaly detection algorithm using a one-class classification algorithm and FL. The detection performance evaluation confirms that the proposed method can share the autonomously detected zero-day attacks among IoT networks while suppressing FPs generated during the candidate extraction process.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 50 条
  • [31] Towards Probabilistic Identification of Zero-day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 64 - 72
  • [32] Zero-Day Evasion Attack Analysis on Race between Attack and Defense
    Kwon, Hyun
    Yoon, Hyunsoo
    Choi, Daeseon
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 805 - 807
  • [33] MS-ZeroWall: Detecting Zero-Day Multi-Step Attack in Smart Home Using VAE and HMM
    Li, Taotao
    Hong, Zhen
    Feng, Wanglei
    Yu, Li
    Wen, Zhenyu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 13278 - 13291
  • [34] Decision Support System for Zero-day Attack Response
    Kim, Huy Kang
    Kim, Soo-Kyun
    Kim, Seok-Hun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 : 221 - 241
  • [35] Zero-day attack detection: a systematic literature review
    Rasheed Ahmad
    Izzat Alsmadi
    Wasim Alhamdani
    Lo’ai Tawalbeh
    Artificial Intelligence Review, 2023, 56 : 10733 - 10811
  • [36] Zero-Day Malware Classification and Detection Using Machine Learning
    Kumar J.
    Rajendran B.
    Sudarsan S.D.
    SN Computer Science, 5 (1)
  • [37] A Zero-Shot Learning-Based Detection Model Against Zero-Day Attacks in IoT
    Gao, Xueqin
    Chen, Kai
    Zhao, Yufei
    Zhang, Peng
    Han, Longxi
    Zhang, Daojuan
    2024 9TH INTERNATIONAL CONFERENCE ON ELECTRONIC TECHNOLOGY AND INFORMATION SCIENCE, ICETIS 2024, 2024, : 309 - 314
  • [38] Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks
    Alshehri, Ali
    Badr, Mahmoud M.
    Baza, Mohamed
    Alshahrani, Hani
    SENSORS, 2024, 24 (10)
  • [39] Toward Zero-day Attack Identification Using Linear Data Transformation Techniques
    AlEroud, Ahmed
    Karabatis, George
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 159 - 168
  • [40] SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization
    Duraz, Robin
    Espes, David
    Francq, Julien
    Vaton, Sandrine
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,