2022
DOI: 10.1109/access.2022.3187116
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches

Abstract: Recently, network intrusion attacks, particularly new unknown attacks referred to as zeroday attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they seek to exploit the vulnerabilities of a network system. Previous studies have demonstrated that zero-day attacks can compromise a network for prolonged periods if network traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays a crucial role in supporting machine learni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 44 publications
0
20
0
Order By: Relevance
“…According to the comparison stated in Table 2 , diverse learning models have been presented in the literature to address the problem of identifying malicious DoH. These include (but are not limited to) the long short-term memory (LSTM) based DoH identification model proposed by Davidson et al [ 38 ], the one class support vector machine (OCSVM) based DoH identification model proposed by Mbona et al [ 51 ], the Bidirectional-LSTM (Bi-LSTM) based DoH identification model proposed by X. Du et al [ 52 ], the ensemble learning of Decision trees (EL-DT) based DoH identification model proposed by Chijioke et al [ 53 ], the optimizable K-nearest neighbors (O-KNN) based model proposed by Al-Haija et at.…”
Section: Resultsmentioning
confidence: 99%
“…According to the comparison stated in Table 2 , diverse learning models have been presented in the literature to address the problem of identifying malicious DoH. These include (but are not limited to) the long short-term memory (LSTM) based DoH identification model proposed by Davidson et al [ 38 ], the one class support vector machine (OCSVM) based DoH identification model proposed by Mbona et al [ 51 ], the Bidirectional-LSTM (Bi-LSTM) based DoH identification model proposed by X. Du et al [ 52 ], the ensemble learning of Decision trees (EL-DT) based DoH identification model proposed by Chijioke et al [ 53 ], the optimizable K-nearest neighbors (O-KNN) based model proposed by Al-Haija et at.…”
Section: Resultsmentioning
confidence: 99%
“…The main intention of UDP is to saturate the internet pipe. Zero-day flood [25] The "zero-day" used to describe all unknown attacks or new attacks exploiting vulnerabilities.…”
Section: Table 1 Some Of the Common Ddos Attack Typesmentioning
confidence: 99%
“…Also, deep learning has been used to design security models that can be used on large-scale security datasets [ 125 ]. Mbona and Eloff [ 126 ] designed a semi-supervised machine learning approach to detect zero-day (new unknown) intrusion attacks based on the law of anomalous numbers to identify significant network features that effectively show anomalous behaviour. Similarly, Benlamine et al [ 127 ], used a machine learning model to evaluate emotional reactions in virtual reality environments where the face is hidden in a virtual reality headset, making facial expression detection using a webcam impossible.…”
Section: Machine Learning Researchmentioning
confidence: 99%