Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application
In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9461213/ |
id |
doaj-188c99490aa24d6181dce34206a3b97b |
---|---|
record_format |
Article |
spelling |
doaj-188c99490aa24d6181dce34206a3b97b2021-06-29T23:00:28ZengIEEEIEEE Access2169-35362021-01-019906039061510.1109/ACCESS.2021.30909579461213Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and ApplicationTommaso Zoppi0https://orcid.org/0000-0001-9820-6047Andrea Ceccarelli1https://orcid.org/0000-0002-2291-2428Andrea Bondavalli2https://orcid.org/0000-0001-7366-6530Department of Mathematics and Informatics, University of Florence, Florence, ItalyDepartment of Mathematics and Informatics, University of Florence, Florence, ItalyDepartment of Mathematics and Informatics, University of Florence, Florence, ItalyIn the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characterized. Instead, new unknown threats, often referred to as zero-day attacks or zero-days, likely go undetected as they are often misclassified by those techniques. In recent years, unsupervised anomaly detection algorithms showed potential to detect zero-days. However, dedicated support for quantitative analyses of unsupervised anomaly detection algorithms is still scarce and often does not promote meta-learning, which has potential to improve classification performance. To such extent, this paper introduces the problem of zero-days and reviews unsupervised algorithms for their detection. Then, the paper applies a question-answer approach to identify typical issues in conducting quantitative analyses for zero-days detection, and shows how to setup and exercise unsupervised algorithms with appropriate tooling. Using a very recent attack dataset, we debate on i) the impact of features on the detection performance of unsupervised algorithms, ii) the relevant metrics to evaluate intrusion detectors, iii) means to compare multiple unsupervised algorithms, iv) the application of meta-learning to reduce misclassifications. Ultimately, v) we measure detection performance of unsupervised anomaly detection algorithms with respect to zero-days. Overall, the paper exemplifies how to practically orchestrate and apply an appropriate methodology, process and tool, providing even non-experts with means to select appropriate strategies to deal with zero-days.https://ieeexplore.ieee.org/document/9461213/Zero-day attacksintrusion detectionmachine learninganomaly detectionRELOADsecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tommaso Zoppi Andrea Ceccarelli Andrea Bondavalli |
spellingShingle |
Tommaso Zoppi Andrea Ceccarelli Andrea Bondavalli Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application IEEE Access Zero-day attacks intrusion detection machine learning anomaly detection RELOAD security |
author_facet |
Tommaso Zoppi Andrea Ceccarelli Andrea Bondavalli |
author_sort |
Tommaso Zoppi |
title |
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application |
title_short |
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application |
title_full |
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application |
title_fullStr |
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application |
title_full_unstemmed |
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application |
title_sort |
unsupervised algorithms to detect zero-day attacks: strategy and application |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characterized. Instead, new unknown threats, often referred to as zero-day attacks or zero-days, likely go undetected as they are often misclassified by those techniques. In recent years, unsupervised anomaly detection algorithms showed potential to detect zero-days. However, dedicated support for quantitative analyses of unsupervised anomaly detection algorithms is still scarce and often does not promote meta-learning, which has potential to improve classification performance. To such extent, this paper introduces the problem of zero-days and reviews unsupervised algorithms for their detection. Then, the paper applies a question-answer approach to identify typical issues in conducting quantitative analyses for zero-days detection, and shows how to setup and exercise unsupervised algorithms with appropriate tooling. Using a very recent attack dataset, we debate on i) the impact of features on the detection performance of unsupervised algorithms, ii) the relevant metrics to evaluate intrusion detectors, iii) means to compare multiple unsupervised algorithms, iv) the application of meta-learning to reduce misclassifications. Ultimately, v) we measure detection performance of unsupervised anomaly detection algorithms with respect to zero-days. Overall, the paper exemplifies how to practically orchestrate and apply an appropriate methodology, process and tool, providing even non-experts with means to select appropriate strategies to deal with zero-days. |
topic |
Zero-day attacks intrusion detection machine learning anomaly detection RELOAD security |
url |
https://ieeexplore.ieee.org/document/9461213/ |
work_keys_str_mv |
AT tommasozoppi unsupervisedalgorithmstodetectzerodayattacksstrategyandapplication AT andreaceccarelli unsupervisedalgorithmstodetectzerodayattacksstrategyandapplication AT andreabondavalli unsupervisedalgorithmstodetectzerodayattacksstrategyandapplication |
_version_ |
1721354176609386496 |