Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
Abstract
:1. Introduction
2. Literature Review
2.1. Anomaly-Based
2.2. Graph-Based
2.3. AI-Based Solutions
2.3.1. Detection Models
Decision Trees
Random Forests
Multilayer Perceptron
Bloom Filter Model
Long Short-Term Memory
Hybrid Multilevel Anomaly Detection-IDS
Kalman Filter
Zero-Shot Learning
Support Vector Data Description
Autoencoder
Convolutional Neural Networks
Reinforcement Learning
Deep Neural Network
Transferred Deep-Convolutional Generative Adversarial Network (tDCGAN)
WAVED
2.3.2. Datasets
2.3.3. Evaluation Metrics
- -
- True Positive () is the total positive instances identified as positive.
- -
- True Negative () is the number of negative instances identified as negative.
- -
- False Positive () is defined as the number of negative instances classified or predicted as positive.
- -
- False Negative () is the number of positive instances classified or predicted as negative.
- -
- Accuracy is the ratio between the number of correct predictions and a total number of predictions.
- -
- : is defined as the ratio between TPs combined with several TPs and FPs. It is the percentage of correctly identified positives out of all the results that were said to be positive either correctly or not.
- -
- : the ratio between TPs combined to several TPs and FNs. It is the percentage of correctly identified positives out of all actual positives, either correctly or not.
- -
- : It takes both false negatives and false positives into consideration, and is the harmonic mean of recall and precision. It performs well on imbalanced datasets.
2.3.4. Main Approaches
3. Comparative Analysis
4. Research Limitations
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Yoon, H.; Jang, Y.; Kim, S.; Speasmaker, A.; Nam, I. Trends in internet use among older adults in the United States, 2011–2016. J. Appl. Gerontol. 2021, 40, 466–470. [Google Scholar] [CrossRef]
- Alhashmi, A.A.; Darem, A.; Abawajy, J.H. Taxonomy of Cybersecurity Awareness Delivery Methods: A Countermeasure for Phishing Threats. Int. J. Adv. Comput. Sci. Appl. 2021, 12. [Google Scholar] [CrossRef]
- Al-Marghilani, A. Comprehensive Analysis of IoT Malware Evasion Techniques. Eng. Technol. Appl. Sci. Res. 2021, 11, 7495–7500. [Google Scholar] [CrossRef]
- Bhattacharyya, D.K.; Kalita, J.K. Network Anomaly Detection: A Machine Learning Perspective; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
- Zeng, Y.; Hu, X.; Shin, K.G. Detection of botnets using combined host-and network-level information. In Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), Chicago, IL, USA, 28 June 2010–1 July 2010; pp. 291–300. [Google Scholar]
- Studnia, I.; Nicomette, V.; Alata, E.; Deswarte, Y.; Kaâniche, M.; Laarouchi, Y. Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of the 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, Hungary, 24–27 June 2013; pp. 1–12. [Google Scholar]
- Meakins, J. A zero-sum game: The zero-day market in 2018. J. Cyber Policy 2019, 4, 60–71. [Google Scholar] [CrossRef]
- Fang, B.; Lu, Q.; Pattabiraman, K.; Ripeanu, M.; Gurumurthi, S. ePVF: An enhanced program vulnerability factor methodology for cross-layer resilience analysis. In Proceedings of the 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, 28 June–1 July 2016; pp. 168–179. [Google Scholar]
- Ambalavanan, V. Cyber threats detection and mitigation using machine learning. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security; IGI Global: Hershey, PA, USA, 2020; pp. 132–149. [Google Scholar]
- Nabi, S.; Rehman, S.U.; Fong, S.; Aziz, K. A model for implementing security at application level in service oriented architecture. J. Emerg. Technol. Web Intell. 2014, 6, 157–163. [Google Scholar] [CrossRef] [Green Version]
- Craigen, D.; Diakun-Thibault, N.; Purse, R. Defining cybersecurity. Technol. Innov. Manag. Rev. 2014, 4, 13–21. [Google Scholar] [CrossRef]
- He, S.; Zhu, J.; He, P.; Lyu, M.R. Experience report: System log analysis for anomaly detection. In Proceedings of the 2016 IEEE 27th international symposium on software reliability engineering (ISSRE), Ottawa, ON, Canada, 23–27 October 2016; pp. 207–218. [Google Scholar]
- Al-Qatf, M.; Lasheng, Y.; Al-Habib, M.; Al-Sabahi, K. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 2018, 6, 52843–52856. [Google Scholar] [CrossRef]
- Hindy, H.; Brosset, D.; Bayne, E.; Seeam, A.K.; Tachtatzis, C.; Atkinson, R.; Bellekens, X. A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 2020, 8, 104650–104675. [Google Scholar] [CrossRef]
- Pan, K.; Rakhshani, E.; Palensky, P. False data injection attacks on hybrid AC/HVDC interconnected systems with virtual inertia—Vulnerability, impact and detection. IEEE Access 2020, 8, 141932–141945. [Google Scholar] [CrossRef]
- Zoppi, T.; Ceccarelli, A.; Salani, L.; Bondavalli, A. On the educated selection of unsupervised algorithms via attacks and anomaly classes. J. Inf. Secur. Appl. 2020, 52, 102474. [Google Scholar] [CrossRef]
- Hanselmann, M.; Strauss, T.; Dormann, K.; Ulmer, H. CANet: An unsupervised intrusion detection system for high dimensional CAN bus data. IEEE Access 2020, 8, 58194–58205. [Google Scholar] [CrossRef]
- Latif, J.; Xiao, C.; Imran, A.; Tu, S. Medical imaging using machine learning and deep learning algorithms: A review. In Proceedings of the 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 30–31 January 2019; pp. 1–5. [Google Scholar]
- Latif, J.; Xiao, C.; Tu, S.; Rehman, S.U.; Imran, A.; Bilal, A. Implementation and use of disease diagnosis systems for electronic medical records based on machine learning: A complete review. IEEE Access 2020, 8, 150489–150513. [Google Scholar] [CrossRef]
- Vargas, R.; Mosavi, A.; Ruiz, R. Deep learning: A review. Advances in Intelligent Systems and Computing 2017, 5, 1–10. [Google Scholar]
- LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef]
- Biabani, S.A.A.; Tayyib, N.A. A Review on the Use of Machine Learning Against the Covid-19 Pandemic. Eng. Technol. Appl. Sci. Res. 2022, 12, 8039–8044. [Google Scholar] [CrossRef]
- Chapman, C. Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools; Syngress: Oxford, UK, 2016. [Google Scholar]
- Singh, A.P. A study on zero day malware attack. Int. J. Adv. Res. Comput. Commun. Eng. 2017, 6, 391–392. [Google Scholar] [CrossRef]
- Bilge, L.; Dumitraş, T. Before we knew it: An empirical study of zero-day attacks in the real world. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 833–844. [Google Scholar]
- Nguyen, T.T.; Reddi, V.J. Deep reinforcement learning for cyber security. IEEE Trans. Neural Netw. Learn. Syst. 2019. [Google Scholar] [CrossRef] [PubMed]
- Metrick, K.; Najafi, P.; Semrau, J. Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill—Intelligence for Vulnerability Management. Technical Report, Technical REPORT, FireEye Technical Report. Available online: https://www.fireeye.com/blog/threat-research/2020/04/zero-day-exploitation-demonstrates-access-to-money-not-skill.html (accessed on 1 September 2022).
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine learning and deep learning methods for cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Albanese, M.; Jajodia, S.; Singhal, A.; Wang, L. An efficient approach to assessing the risk of zero-day vulnerabilities. In Proceedings of the 2013 International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland, 29–31 July 2013; pp. 1–12. [Google Scholar]
- Kaloudi, N.; Li, J. The ai-based cyber threat landscape: A survey. ACM Comput. Surv. (CSUR) 2020, 53, 1–34. [Google Scholar] [CrossRef] [Green Version]
- Hindy, H.; Hodo, E.; Bayne, E.; Seeam, A.; Atkinson, R.; Bellekens, X. A taxonomy of malicious traffic for intrusion detection systems. In Proceedings of the 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), Scotland, UK, 11–12 June 2018; pp. 1–4. [Google Scholar]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2019, 2, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Palmieri, F. Network anomaly detection based on logistic regression of nonlinear chaotic invariants. J. Netw. Comput. Appl. 2019, 148, 102460. [Google Scholar] [CrossRef]
- Duessel, P.; Gehl, C.; Flegel, U.; Dietrich, S.; Meier, M. Detecting zero-day attacks using context-aware anomaly detection at the application-layer. Int. J. Inf. Secur. 2017, 16, 475–490. [Google Scholar] [CrossRef]
- Moon, D.; Pan, S.B.; Kim, I. Host-based intrusion detection system for secure human-centric computing. J. Supercomput. 2016, 72, 2520–2536. [Google Scholar] [CrossRef]
- Moustafa, N.; Choo, K.K.R.; Radwan, I.; Camtepe, S. Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1975–1987. [Google Scholar] [CrossRef]
- Kaur, R.; Singh, M. A hybrid real-time zero-day attack detection and analysis system. Int. J. Comput. Netw. Inf. Secur. 2015, 7, 19–31. [Google Scholar] [CrossRef] [Green Version]
- Khan, I.A.; Pi, D.; Khan, Z.U.; Hussain, Y.; Nawaz, A. HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access 2019, 7, 89507–89521. [Google Scholar] [CrossRef]
- Sun, X.; Dai, J.; Liu, P.; Singhal, A.; Yen, J. Using Bayesian networks for probabilistic identification of zero-day attack paths. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2506–2521. [Google Scholar] [CrossRef]
- Bayoğlu, B.; Soğukpınar, İ. Graph based signature classes for detecting polymorphic worms via content analysis. Comput. Netw. 2012, 56, 832–844. [Google Scholar] [CrossRef]
- Yichao, Z.; Tianyang, Z.; Xiaoyue, G.; Qingxian, W. An improved attack path discovery algorithm through compact graph planning. IEEE Access 2019, 7, 59346–59356. [Google Scholar] [CrossRef]
- Grana, J.; Wolpert, D.; Neil, J.; Xie, D.; Bhattacharya, T.; Bent, R. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks. J. Netw. Comput. Appl. 2016, 66, 166–179. [Google Scholar] [CrossRef]
- Wang, B.; Zheng, Y.; Lou, W.; Hou, Y.T. DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 2015, 81, 308–319. [Google Scholar] [CrossRef]
- Singh, U.K.; Joshi, C.; Kanellopoulos, D. A framework for zero-day vulnerabilities detection and prioritization. J. Inf. Secur. Appl. 2019, 46, 164–172. [Google Scholar] [CrossRef]
- Abirami, S.; Chitra, P. Energy-efficient edge based real-time healthcare support system. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2020; Volume 117, pp. 339–368. [Google Scholar]
- Ma, L.; Chamberlain, R.D.; Buhler, J.D.; Franklin, M.A. Bloom filter performance on graphics engines. In Proceedings of the 2011 International Conference on Parallel Processing, Taipei, Taiwan, 13–16 September 2011; pp. 522–531. [Google Scholar]
- Bloom, B.H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 1970, 13, 422–426. [Google Scholar] [CrossRef]
- Harrison, A.B. Peer-to-Grid Computing: Spanning Diverse Service-Oriented Architectures; Cardiff University: Cardiff, UK, 2008. [Google Scholar]
- Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
- Jemal, I.; Haddar, M.A.; Cheikhrouhou, O.; Mahfoudhi, A. M-CNN: A new hybrid deep learning model for web security. In Proceedings of the 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA), Antalya, Turkey, 2–5 November 2020; pp. 1–7. [Google Scholar]
- Jemal, I.; Haddar, M.A.; Cheikhrouhou, O.; Mahfoudhi, A. Malicious http request detection using code-level convolutional neural network. In Proceedings of the International Conference on Risks and Security of Internet and Systems, Paris, France, 4–6 November 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 317–324. [Google Scholar]
- Welch, G.; Bishop, G. An Introduction to the Kalman Filter; ACM Inc.: New York, NY, USA, 1995. [Google Scholar]
- Romera-Paredes, B.; Torr, P. An embarrassingly simple approach to zero-shot learning. In Proceedings of the International Conference on Machine Learning, PMLR, Lille, France, 6–11 July 2015; pp. 2152–2161. [Google Scholar]
- Tax, D.M.; Duin, R.P. Support vector data description. Mach. Learn. 2004, 54, 45–66. [Google Scholar] [CrossRef] [Green Version]
- Kebede, T.M.; Djaneye-Boundjou, O.; Narayanan, B.N.; Ralescu, A.; Kapp, D. Classification of malware programs using autoencoders based deep learning architecture and its application to the microsoft malware classification challenge (big 2015) dataset. In Proceedings of the 2017 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 27–30 June 2017; pp. 70–75. [Google Scholar]
- Fukushima, K. Neocognitron: A hierarchical neural network capable of visual pattern recognition. Neural Netw. 1988, 1, 119–130. [Google Scholar] [CrossRef]
- Albawi, S.; Mohammed, T.A.; Al-Zawi, S. Understanding of a convolutional neural network. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–6. [Google Scholar]
- Wallach, I.; Dzamba, M.; Heifets, A. AtomNet: A deep convolutional neural network for bioactivity prediction in structure-based drug discovery. arXiv 2015, arXiv:1510.02855. [Google Scholar]
- Ren, H.; Xu, B.; Wang, Y.; Yi, C.; Huang, C.; Kou, X.; Xing, T.; Yang, M.; Tong, J.; Zhang, Q. Time-series anomaly detection service at microsoft. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, 4–8 August 2019; pp. 3009–3017. [Google Scholar]
- Vinayakumar, R.; Soman, K.; Poornachandran, P. Applying convolutional neural network for network intrusion detection. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Manipal, India, 13–16 September 2017; pp. 1222–1228. [Google Scholar]
- Zeiler, M.D.; Fergus, R. Visualizing and understanding convolutional networks. In Proceedings of the European Conference on Computer Vision, Zurich, Switzerland, 8–11 September 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 818–833. [Google Scholar]
- Szegedy, C.; Liu, W.; Jia, Y.; Sermanet, P.; Reed, S.; Anguelov, D.; Erhan, D.; Vanhoucke, V.; Rabinovich, A. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 1–9. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
- Marsland, S. Machine Learning: An Algorithmic Perspective; Chapman and Hall/CRC: Boca Raton, FL, USA, 2011. [Google Scholar]
- Granter, S.R.; Beck, A.H.; Papke Jr, D.J. AlphaGo, deep learning, and the future of the human microscopist. Arch. Pathol. Lab. Med. 2017, 141, 619–621. [Google Scholar] [CrossRef] [Green Version]
- Chen, J.X. The evolution of computing: AlphaGo. Comput. Sci. Eng. 2016, 18, 4–7. [Google Scholar] [CrossRef] [Green Version]
- Xu, X.; Xie, T. A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In Proceedings of the International Conference on Intelligent Computing, Hefei, China, 23–26 August 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 995–1003. [Google Scholar]
- Xu, X.; Sun, Y.; Huang, Z. Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning. In Proceedings of the Pacific-Asia Workshop on Intelligence and Security Informatics, Bangkok, Thailand, 2 April 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 196–207. [Google Scholar]
- Smadi, S.; Aslam, N.; Zhang, L. Detection of online phishing email using dynamic evolving neural network based on reinforcement learning. Decis. Support Syst. 2018, 107, 88–102. [Google Scholar] [CrossRef] [Green Version]
- Feng, M.; Xu, H. Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack. In Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence (SSCI), Honolulu, HI, USA, 27 November–1 December 2017; pp. 1–8. [Google Scholar]
- Baek, J.; Choi, Y. Deep neural network for predicting ore production by truck-haulage systems in open-pit mines. Appl. Sci. 2020, 10, 1657. [Google Scholar] [CrossRef] [Green Version]
- Feng, C.; Li, T.; Chana, D. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. In Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017; pp. 261–272. [Google Scholar]
- Jagtap, S.S.; Sriram, S.V.S.; Subramaniyaswamy, V. A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic. Future Gener. Comput. Syst. 2021, 119, 84–109. [Google Scholar] [CrossRef]
- Alauthman, M.; Aslam, N.; Al-Kasassbeh, M.; Khan, S.; Al-Qerem, A.; Choo, K.K.R. An efficient reinforcement learning-based Botnet detection approach. J. Netw. Comput. Appl. 2020, 150, 102479. [Google Scholar] [CrossRef]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; pp. 1–6. [Google Scholar]
- Sarhan, M.; Layeghy, S.; Gallagher, M.; Portmann, M. From Zero-Shot Machine Learning to Zero-Day Attack Detection. arXiv 2021, arXiv:2109.14868. [Google Scholar] [CrossRef]
- Shaukat, K.; Luo, S.; Varadharajan, V.; Hameed, I.A.; Xu, M. A survey on machine learning techniques for cyber security in the last decade. IEEE Access 2020, 8, 222310–222354. [Google Scholar] [CrossRef]
- Sterman, J. Business Dynamics; Irwin/McGraw-Hill: Irvine, CA, USA, 2010. [Google Scholar]
- RM, S.P.; Maddikunta, P.K.R.; Parimala, M.; Koppu, S.; Gadekallu, T.R.; Chowdhary, C.L.; Alazab, M. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 2020, 160, 139–149. [Google Scholar]
- Javed, A.R.; Usman, M.; Rehman, S.U.; Khan, M.U.; Haghighi, M.S. Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4291–4300. [Google Scholar] [CrossRef]
- Blaise, A.; Bouet, M.; Conan, V.; Secci, S. Detection of zero-day attacks: An unsupervised port-based approach. Comput. Netw. 2020, 180, 107391. [Google Scholar] [CrossRef]
- Hindy, H.; Atkinson, R.; Tachtatzis, C.; Colin, J.N.; Bayne, E.; Bellekens, X. Utilising deep learning techniques for effective zero-day attack detection. Electronics 2020, 9, 1684. [Google Scholar] [CrossRef]
- Sameera, N.; Shashi, M. Deep transductive transfer learning framework for zero-day attack detection. ICT Express 2020, 6, 361–367. [Google Scholar] [CrossRef]
- Vinayakumar, R.; Alazab, M.; Soman, K.; Poornachandran, P.; Venkatraman, S. Robust intelligent malware detection using deep learning. IEEE Access 2019, 7, 46717–46738. [Google Scholar] [CrossRef]
- Vercruyssen, V.; Meert, W.; Davis, J. Transfer learning for time series anomaly detection. In Proceedings of the Workshop and Tutorial on Interactive Adaptive Learning@ ECMLPKDD 2017, CEUR Workshop Proceedings, Skopje, Macedonia, 18 September 2017; Volume 1924, pp. 27–37. [Google Scholar]
- Sameera, N.; Shashi, M. Transfer learning based prototype for zero-day attack detection. Int. J. Eng. Adv. Technol. (IJEAT) 2019, 8, 1326–1329. [Google Scholar]
- Kim, J.Y.; Bu, S.J.; Cho, S.B. Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf. Sci. 2018, 460, 83–102. [Google Scholar] [CrossRef]
- Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 2018, 82, 761–768. [Google Scholar] [CrossRef]
- Saied, A.; Overill, R.E.; Radzik, T. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 2016, 172, 385–393. [Google Scholar] [CrossRef]
- Ur Rehman, S.; Khaliq, M.; Imtiaz, S.I.; Rasool, A.; Shafiq, M.; Javed, A.R.; Jalil, Z.; Bashir, A.K. Diddos: An approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Future Gener. Comput. Syst. 2021, 118, 453–466. [Google Scholar] [CrossRef]
- Javed, A.R.; Ur Rehman, S.; Khan, M.U.; Alazab, M.; Reddy, T. CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1456–1466. [Google Scholar] [CrossRef]
- Afek, Y.; Bremler-Barr, A.; Feibish, S.L. Zero-day signature extraction for high-volume attacks. IEEE/ACM Trans. Netw. 2019, 27, 691–706. [Google Scholar] [CrossRef]
- More, P.; Mishra, P. Enhanced-PCA based dimensionality reduction and feature selection for real-time network threat detection. Eng. Technol. Appl. Sci. Res. 2020, 10, 6270–6275. [Google Scholar] [CrossRef]
- Balamurugan, V.; Saravanan, R. Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 2019, 22, 13027–13039. [Google Scholar] [CrossRef]
- Saba Jameel, S.U.R. An optimal feature selection method using a modified wrapper-based ant colony optimisation. Natl. Sci. Found Sri Lanka 2018, 46, 143–151. [Google Scholar] [CrossRef]
- Yavanoglu, O.; Aydos, M. A review on cyber security datasets for machine learning algorithms. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; pp. 2186–2193. [Google Scholar]
- Van Wyk, F.; Wang, Y.; Khojandi, A.; Masoud, N. Real-time sensor anomaly detection and identification in automated vehicles. IEEE Trans. Intell. Transp. Syst. 2019, 21, 1264–1276. [Google Scholar] [CrossRef]
- Usman, N.; Usman, S.; Khan, F.; Jan, M.A.; Sajid, A.; Alazab, M.; Watters, P. Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics. Future Gener. Comput. Syst. 2021, 118, 124–141. [Google Scholar] [CrossRef]
- Mansouri, A.; Majidi, B.; Shamisa, A. Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures. Int. J. Comput. Appl. 2021, 43, 257–266. [Google Scholar] [CrossRef]
- Nedeljkovic, D.; Jakovljevic, Z. CNN based method for the development of cyber-attacks detection algorithms in industrial control systems. Comput. Secur. 2022, 114, 102585. [Google Scholar] [CrossRef]
- Zoppi, T.; Ceccarelli, A. Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection. J. Netw. Comput. Appl. 2021, 189, 103106. [Google Scholar] [CrossRef]
- Bu, S.J.; Cho, S.B. Integrating deep learning with first-order logic programmed constraints for zero-day phishing attack detection. In Proceedings of the ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada, 6–11 June 2021; pp. 2685–2689. [Google Scholar]
- Böse, B.; Avasarala, B.; Tirthapura, S.; Chung, Y.Y.; Steiner, D. Detecting insider threats using radish: A system for real-time anomaly detection in heterogeneous data streams. IEEE Syst. J. 2017, 11, 471–482. [Google Scholar] [CrossRef]
- Lo, O.; Buchanan, W.J.; Griffiths, P.; Macfarlane, R. Distance measurement methods for improved insider threat detection. Secur. Commun. Netw. 2018, 2018, 5906368. [Google Scholar] [CrossRef]
- Al-Mhiqani, M.N.; Ahmad, R.; Abidin, Z.Z.; Abdulkareem, K.H.; Mohammed, M.A.; Gupta, D.; Shankar, K. A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 2022, 97, 107597. [Google Scholar] [CrossRef]
- Kunang, Y.N.; Nurmaini, S.; Stiawan, D.; Zarkasi, A. Automatic features extraction using autoencoder in intrusion detection system. In Proceedings of the 2018 International Conference on Electrical Engineering and Computer Science (ICECOS), Pangkal, Indonesia, 2–4 October 2018; pp. 219–224. [Google Scholar]
Actual | |||
---|---|---|---|
Predicted | True | False | |
True | True Positive | False Positive | |
False | False Negative | True Negative |
Paper | Year | Methodology | Summary |
---|---|---|---|
[79] | 2020 | Deep Neural Network Approach | Optimization and dimensionality reduction were done using Grey Wolf Optimizer (GWO) and PCA. Dimensionality reduction technique resulted in 15% increased accuracy. |
[80] | 2020 | Convolutional Neural Network (CNN) with Long Short-Term Memory (LSTM) | Abnormality detection through the applied voting scheme on automotive generated data using various classifiers for final decision. |
[81] | 2020 | Port Analysis using Statistical Approach | Port uses detection based upon the profile used by the port. Host traffic collection in a distributed environment. High-volume attacks focused. Attacks that were low volume were not covered. |
[82] | 2020 | Deep Neural Network | Auto-encoder with deep neural network architecture was presented. Performance was analyzed on NSL-KDD and CICIDS2017 datasets. |
[83] | 2020 | Deep Neural Network | Manifold alignment for the unification of feature space. Soft labeling was employed. Zero-day detection was done using a high-volume attacks training phase. CIDD and NSL-KDD resulted in poor zero-day detection performance. |
[74] | 2020 | Detection using Reinforcement Learning | CART algorithm utilized for model features selection. Network traffic (real-time) was used for evaluation. |
[84] | 2019 | Deep Learning | Dynamic, static, and image-based analysis was conducted for malware detection. Researchers tested executable binaries of malware. The technique was Hosts oriented. For ZAs detection, work and study at the kernel level were also done. |
[79] | 2019 | Snort Intrusion Detection System using Hybrid Approach | Assignment of exploitation likelihood was done using Ranking Algorithm based on frequency. High-volume attack-focused time stamp-based attack graphs were built. The main focus was on high-volume attacks. Low-volume attacks were ignored. |
[39] | 2019 | K-Nearest Neighbor (KNN) and Bloom Filter based Hybrid approach | KNN and Bloom filter was used for capturing and analyzing network traffic. High false positives resulted from the Bloom filter. The anomaly-based approach was employed for high and low-volume zero-day attack detection. |
[78] | 2019 | Stats Model | Disclosing relation of exploit and vulnerability was the main focus. Copula functions such as student-t and Gaussian were used. |
[33] | 2018 | Generative Adversarial Network utilizing autoencoder | Detection of ZAs works by leveraging noise addition in existing malware. ZA detection of fixed-length malware was focused. |
[40] | 2018 | Bayes Network | Nodes (hosts) of graph consisted of file instances, and edges were communication between nodes. Accurate evidence availability was a factor for performance. Host-based technique. |
[35] | 2017 | Support Vector Machine (one-class) | Sequential features within protocol context were combined and focused upon. Only application layer attacks were considered. |
Attacks | Ref | Year | Datasets | Approach | Accuracy | Precision | Recall | F1 Score |
---|---|---|---|---|---|---|---|---|
IDS | [42] | 2019 | ICS | HML-IDS | 97 | 98 | 92 | 95 |
[42] | 2019 | ICS | Bloom Filter | 89 | 97 | 67 | 78 | |
[42] | 2019 | ICS | RF | 91 | 93 | 81 | 86 | |
[97] | 2017 | ICS | LSTM | 92 | 94 | 78 | 85 | |
[97] | 2017 | ICS | SVDD | 76 | 95 | 21 | 34 | |
[97] | 2017 | ICS | Bloom Filter | 87 | 97 | 59 | 73 | |
[98] | 2021 | ICS | BLOSOM | |||||
[98] | 2021 | ICS | MLP | 95 | 96 | 90 | ||
[99] | 2018 | ICS | CNN | 97.85 | 98.8 | 83 | ||
[100] | 2021 | ICS | ||||||
Phishing | [89] | 2020 | ISOT, ISCX | Reinforcement learning | 98.3 | 97.9 | 98.8 | |
[101] | 2021 | ISCX | Stacker | 98.8 | 90.3 | 94.3 | 92.3 | |
[102] | 2021 | ISCX | Logic-Integrated Triplet Network | 97.85 | 96.10 | |||
Insider Threat Detection | [103] | 2017 | CERT | Unsupervised KNN | 54 | 47.5 | 44.2 | 44.9 |
[104] | 2018 | CERT | Hidden Markov Model | 71.1 | 64.1 | 55.9 | 61.7 | |
[105] | 2021 | CERT | SVM | 70 | 40 | 11 | 60 | |
[105] | 2021 | CERT | LSTM | 75 | 20 | 59 | 30 | |
[105] | 2021 | CERT | DNN | 86 | 36 | 73 | 48 | |
[105] | 2021 | CERT | MITD | 92 | 54 | 54 | 55 | |
[105] | 2021 | CERT | HITD | 97 | 77 | 92 | 84 | |
[78] | 2020 | NSL KDD | Autoencoder | 92.96 | ||||
[101] | 2021 | NSL KDD | Stacker | 99.39 | 99.7 | 99 | 99.3 | |
DoS/DDoS | [78] | 2020 | CICIDS 2017 | Autoencoder | 95.19 | |||
[52] | 2021 | UNSW-NB15 | ZSL-RF | 99.71 | 96.85 | 97 | ||
[52] | 2021 | UNSW-NB15 | ZSL-MLP | 99.55 | 96.53 | 95 | ||
[101] | 2021 | CICIDS 2017 | Stacker | 99.97 | 99.8 | 100 | 99.9 | |
[106] | 2018 | KDD CUP 99, NSL KDD | Autoencoder | 86.96 | 88.65 | |||
Anomaly-based | [105] | 2021 | CERT | AITD | 90 | 49 | 50 | 49 |
[73] | 2021 | SWaT | CNN | 92 | 88 | 98 | 92 | |
[73] | 2021 | SWaT | DBN | 80 | 72 | 72 | 83 | |
[73] | 2021 | SWaT | PCA+CNN | 95 | 94 | 97 | 95 | |
[73] | 2021 | SWaT | PCA+DBN | 91 | 88 | 95 | 91 | |
[73] | 2021 | SWaT | BLOSOM | 96 | 96 | 98 | 96 | |
[73] | 2020 | SPMD | MSALSTM-CNN | 96.56 | 99.06 | 97.37 | ||
[73] | 2020 | SPMD | WAVED | 94.87 | 98.87 | 95.44 | ||
[97] | 2019 | SPMD | KF | 97.4 | 94.5 | 91.7 | ||
[97] | 2019 | SPMD | CNN | 98.0 | 99.8 | 96.4 | ||
[97] | 2019 | SPMD | CNN-KF | 98.2 | 99.5 | 96.8 | ||
Spam-based | [51] | 2020 | Enron Spam Dataset | DL-based feature extraction | 92.86 | 91.27 | 92.86 | |
[101] | 2021 | UNSW-NB15 | Stacker | 97.19 | 98.2 | 94.6 | 96.4 | |
Malware-based | [36] | 2018 | Malware Dataset | tDCGAN | 95.74 | 94.4 | 91.5 | 92.4 |
[98] | 2021 | Network Dataset | DT | - | 100 | 98 | 99 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ali, S.; Rehman, S.U.; Imran, A.; Adeem, G.; Iqbal, Z.; Kim, K.-I. Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection. Electronics 2022, 11, 3934. https://doi.org/10.3390/electronics11233934
Ali S, Rehman SU, Imran A, Adeem G, Iqbal Z, Kim K-I. Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection. Electronics. 2022; 11(23):3934. https://doi.org/10.3390/electronics11233934
Chicago/Turabian StyleAli, Shamshair, Saif Ur Rehman, Azhar Imran, Ghazif Adeem, Zafar Iqbal, and Ki-Il Kim. 2022. "Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection" Electronics 11, no. 23: 3934. https://doi.org/10.3390/electronics11233934
APA StyleAli, S., Rehman, S. U., Imran, A., Adeem, G., Iqbal, Z., & Kim, K. -I. (2022). Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection. Electronics, 11(23), 3934. https://doi.org/10.3390/electronics11233934