Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques

Author:

Ibrahim Hairab Belal1ORCID,Aslan Heba K.23,Elsayed Mahmoud Said3ORCID,Jurcut Anca D.4ORCID,Azer Marianne A.15ORCID

Affiliation:

1. School of Information Technology and Computer Science, Nile University, Cairo 12677, Egypt

2. Informatics Department, Electronics Research Institute, Cairo 12622, Egypt

3. Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza 12588, Egypt

4. School of Computer Science, University College Dublin, 7777 Belfield, Ireland

5. National Telecommunication Institute, Cairo 11765, Egypt

Abstract

The rapid development of cyberattacks in the field of the Internet of things (IoT) introduces new security challenges regarding zero-day attacks. Intrusion-detection systems (IDS) are usually trained on specific attacks to protect the IoT application, but the attacks that are yet unknown for IDS (i.e., zero-day attacks) still represent challenges and concerns regarding users’ data privacy and security in those applications. Anomaly-detection methods usually depend on machine learning (ML)-based methods. Under the ML umbrella are classical ML-based methods, which are known to have low prediction quality and detection rates with regard to data that it has not yet been trained on. DL-based methods, especially convolutional neural networks (CNNs) with regularization methods, address this issue and give a better prediction quality with unknown data and avoid overfitting. In this paper, we evaluate and prove that the CNNs have a better ability to detect zero-day attacks, which are generated from nonbot attackers, compared to classical ML. We use classical ML, normal, and regularized CNN classifiers (L1, and L2 regularized). The training data consists of normal traffic data, and DDoS attack data, as it is the most common attack in the IoT. In order to give the full picture of this evaluation, the testing phase of those classifiers will include two scenarios, each having data with different attack distribution. One of these is the backdoor attack, and the other is the scanning attack. The results of the testing proves that the regularized CNN classifiers still perform better than the classical ML-based methods in detecting zero-day IoT attacks.

Funder

University College Dublin

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. IoT Intrusion Detection: A Review of ML and DL-Based Approaches;2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET);2024-05-16

2. Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoT;2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2024-05-08

3. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm;Electronics;2024-03-12

4. Anomaly Detection for IOT Systems Using Active Learning;Applied Sciences;2023-11-04

5. Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT;IEEE Transactions on Consumer Electronics;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3