Assessment of Zero-Day Vulnerability using Machine Learning Approach

Authors

  • SakthiMurugan S Amrita School of Computing
  • Sanjay Kumaar A Amrita School of Computing
  • Vishnu Vignesh Amrita School of Computing
  • Santhi P Amrita School of Computing

DOI:

https://doi.org/10.4108/eetiot.4978

Keywords:

zero-day vulnerabilities, machine learning, autoencoder model, neural network, intrusion detection

Abstract

Organisations and people are seriously threatened by zero-day vulnerabilities because they may be utilised by attackers to infiltrate systems and steal private data. Currently, Machine Learning (ML) techniques are crucial for finding zero-day vulnerabilities since they can analyse huge datasets and find patterns that can point to a vulnerability. This research’s goal is to provide a reliable technique for detecting intruders and zero-day vulnerabilities in software systems. The suggested method employs a Deep Learning (DL) model and an auto-encoder model to find unusual data patterns. Additionally, a model for outlier detection that contrasts the autoencoder model with the single class-based Support Vector Machine (SVM) technique will be developed. The dataset of known vulnerabilities and intrusion attempts will be used to train and assess the models.

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

Kaloudi, Nektaria, Li, Jingyue. The AI-Based Cyber Threat Landscape: A Survey. ACM Computing Surveys (CSUR). 2020; 53(1):1-34. DOI: https://doi.org/10.1145/3372823

Rajesh KP, Santhi P. Unified DL approach for Efficient IDS using Integrated Spatial–Temporal Features. Knowledge-Based Systems. 2021; 226:107-132.

Chen P, Lin C, Schölkopf B. A Tutorial on ν-support vector machines. Applied Stochastic Models in Business and Industry. 2005; 21:111-136. DOI: https://doi.org/10.1002/asmb.537

Jayachitra S, Prasanth A, Rafi, Shaik Mohammad, Zulaikha Beevi S. Hierarchical-Based Binary Moth Flame Optimization for Feature Extraction in Biomedical Application. In: Khare, Nilay, Tomar, Deepak S, Ahirwal, Mitul K, Semwal, Vijay B, Soni, Vaibhav, editors. Machine Learning, Image Processing, Network Security and Data Sciences. Proceedings of the 4th International Conference on ML, Image Processing, Network Security and Data Sciences; 2022. Springer Nature Switzerland; 2022. p. 27-38. DOI: https://doi.org/10.1007/978-3-031-24352-3_3

Jayachitra S, Prasanth A, Hariprasath S, Benazir Begam R, Madiajagan M. In AI Models for Blockchain-Based Intelligent Networks in IoT Systems: Concepts, Methodologies, Tools, and Applications. Springer International Publishing; 2023. Chapter 7, AI Enabled Internet of Medical Things in Smart Healthcare; pp. [141-161]. DOI: https://doi.org/10.1007/978-3-031-31952-5_7

Kavitha M, Roobini S, Prasanth A, Sujaritha M. Machine Learning and Artificial Intelligence in Healthcare Systems. 1st Edition. Boca Raton: CRC Press; 2023. Systematic View and Impact of Artificial Intelligence in Smart Healthcare Systems; pp. [25-56].

Bamidele, Awotunde, Chakraborty, Chinmay, Adeniyi, Emmanuel. Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection. Wireless Communications and Mobile Computing. 2021; 2021:1-17. DOI: https://doi.org/10.1155/2021/7154587

Peppes N, Alexakis T, Adamopoulou E, Demestichas K. The Effectiveness of Zero-Day Attacks Data Samples Generated via GANs on Deep Learning Classifiers. Sensors. 2023; 23:900. DOI: https://doi.org/10.3390/s23020900

Deldar F, Abadi M Deep Learning for Zero-day Malware Detection and Classification: A Survey. ACM Comput. Surv. 2023; 56(2):36. DOI: https://doi.org/10.1145/3605775

Pattawaro, Apichit, Polprasert, Chantri. Anomaly-Based Network Intrusion Detection System through Feature Selection and Hybrid Machine Learning Technique. In: Proceedings of the ICT Knowledge Engineering (ICTKE) Conference; November 2018. p. 1-6. DOI: https://doi.org/10.1109/ICTKE.2018.8612331

Musleh D, Alotaibi M, Alhaidari F, Rahman A, Mohammad RM. Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. Journal of Sensor and Actuator Networks. 2023; 12(2):29. DOI: https://doi.org/10.3390/jsan12020029

Priyatharishini M, Nirmala. A DL-based malicious module identification using stacked sparse autoencoder network for VLSI circuit reliability. In: Measurement (Ed.). Measurement: Proceedings of the Elsevier Conference, 15 May 2022. International Measurement Confederation (IMEKO); 2022. p. 18. DOI: https://doi.org/10.1016/j.measurement.2022.111055

Lirim A., Cihan D. Network IDS using DL. Procedia Computer Science. 2021; 185:239-247. DOI: https://doi.org/10.1016/j.procs.2021.05.025

Ali S, Rehman SU, Imran A, Adeem G, Iqbal Z, Kim KI. Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection. Electronics. 2022; 11:1-17. DOI: https://doi.org/10.3390/electronics11233934

Li P, Pei Y, Li J. A comprehensive survey on design and application of autoencoder in deep learning. Appl. Soft Comput. 138(C):21. DOI: https://doi.org/10.1016/j.asoc.2023.110176

Rushdan, Huthifh, Shurman, Mohammad, Alnabelsi, Sharhabeel, Qutaibah, Althebyan. Zero-Day Attack Detection and Prevention in Software-Defined Networks. In: Proceedings of the Advanced Computer and Information Technology (ACIT) Conference, December 2019.

Akash S, Prabahara P, Vijay K, Soman KP. A Detailed Investigation and Analysis of DL Architectures and Visualization Techniques for Malware Family Identification. Cybersecurity and Secure Information Systems. 2019; 17:241-286. DOI: https://doi.org/10.1007/978-3-030-16837-7_12

Tavallaee M, Bagheri E, Lu W, Ghorbani A. A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). 2009. p. 30-36. DOI: https://doi.org/10.1109/CISDA.2009.5356528

Kanna P, Rajesh, Santhi P. Hybrid Intrusion Detection using MapReduce based Black Widow Optimized Convolutional Long Short-Term Memory Neural Networks. Expert Systems with Applications. 2022; 194:27-43. DOI: https://doi.org/10.1016/j.eswa.2022.116545

Rezaei S, Liu X. Deep Learning for Encrypted Traffic Classification: An Overview. IEEE Communications Magazine. 2019; 57(1):76-81. DOI: https://doi.org/10.1109/MCOM.2019.1800819

Aceto G, Ciuonzo D, Montieri A, Pescapè A. Toward Effective Mobile Encrypted Traffic Classification through Deep Learning. Neurocomputing. 2020; 409. DOI: https://doi.org/10.1016/j.neucom.2020.05.036

Liashchynskyi P, Liashchynskyi P. Grid Search, Random Search, Genetic Algorithm: A Big Comparison for NAS. arXiv. 2019:1-8.

Abri F, Siami-Namini S, Khanghah MA, Soltani FM, Namin AS. Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy In: Proceedings of the 2019 IEEE International Conference on Big Data (Big Data); December 2019; Los Angeles, CA, USA. p. 3252-3259. DOI: https://doi.org/10.1109/BigData47090.2019.9006514

Hindy H, Atkinson R, Tachtatzis C, Colin J-N, Bayne E, Bellekens X. Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection. Electronics. 2020; 9(10):1684. DOI: https://doi.org/10.3390/electronics9101684

Downloads

Published

30-01-2024

How to Cite

[1]
S. S, S. K. A, V. Vignesh, and S. P, “Assessment of Zero-Day Vulnerability using Machine Learning Approach”, EAI Endorsed Trans IoT, vol. 10, Jan. 2024.