An intrusion detection model to detect zero-day attacks in unseen data using machine learning

被引:1
|
作者
Dai, Zhen [1 ]
Por, Lip Yee [1 ]
Chen, Yen-Lin [2 ]
Yang, Jing [1 ]
Ku, Chin Soon [3 ]
Alizadehsani, Roohallah [4 ]
Plawiak, Pawel [5 ,6 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur, Malaysia
[2] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[3] Univ Tunku Abdul Rahman, Dept Comp Sci, Kampar, Malaysia
[4] Deakin Univ, Inst Intelligent Syst Res & Innovat IISRI, Waurn Ponds, Australia
[5] Cracow Univ Technol, Fac Comp Sci & Telecommun, Dept Comp Sci, Krakow, Poland
[6] Polish Acad Sci, Inst Theoret & Appl Informat, Gliwice, Poland
来源
PLOS ONE | 2024年 / 19卷 / 09期
关键词
D O I
10.1371/journal.pone.0308469
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In an era marked by pervasive digital connectivity, cybersecurity concerns have escalated. The rapid evolution of technology has led to a spectrum of cyber threats, including sophisticated zero-day attacks. This research addresses the challenge of existing intrusion detection systems in identifying zero-day attacks using the CIC-MalMem-2022 dataset and autoencoders for anomaly detection. The trained autoencoder is integrated with XGBoost and Random Forest, resulting in the models XGBoost-AE and Random Forest-AE. The study demonstrates that incorporating an anomaly detector into traditional models significantly enhances performance. The Random Forest-AE model achieved 100% accuracy, precision, recall, F1 score, and Matthews Correlation Coefficient (MCC), outperforming the methods proposed by Balasubramanian et al., Khan, Mezina et al., Smith et al., and Dener et al. When tested on unseen data, the Random Forest-AE model achieved an accuracy of 99.9892%, precision of 100%, recall of 99.9803%, F1 score of 99.9901%, and MCC of 99.8313%. This research highlights the effectiveness of the proposed model in maintaining high accuracy even with previously unseen data.
引用
收藏
页数:25
相关论文
共 50 条
  • [31] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [32] A review of Machine Learning-based zero-day attack detection: Challenges and future directions
    Guo, Yang
    COMPUTER COMMUNICATIONS, 2023, 198 : 175 - 185
  • [33] When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
    He, Zhangying
    Miari, Tahereh
    Makrani, Hosein Mohammadi
    Aliasgari, Mehrdad
    Homayoun, Houman
    Sayadi, Hossein
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 85 - 90
  • [34] Deep Learning for Zero-day Malware Detection and Classification: A Survey
    Deldar, Fatemeh
    Abadi, Mahdi
    ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [35] Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
    Yamada, A
    Miyake, Y
    Takemori, K
    Tanaka, T
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 650 - 655
  • [36] Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection
    Comar, Prakash Mandayam
    Liu, Lei
    Saha, Sabyasachi
    Tan, Pang-Ning
    Nucci, Antonio
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2022 - 2030
  • [37] Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications
    Hussey, Jason
    Stone, Kerri
    Camp, Tracy
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [38] Towards Detection of Zero-Day Botnet Attack in IoT Networks using Federated Learning
    Zhang, Jielun
    Liang, Shicong
    Ye, Feng
    Hu, Rose Qingyang
    Qian, Yi
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 7 - 12
  • [39] A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling
    Wang, Guizhou
    Welburn, Jonathan W.
    Hausken, Kjell
    GAMES, 2020, 11 (04): : 1 - 26
  • [40] Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
    Shen, Shigen
    Cai, Chenpeng
    Li, Zhenwei
    Shen, Yizhou
    Wu, Guowen
    Yu, Shui
    APPLIED SOFT COMPUTING, 2024, 150