An Enhanced Classification Model for Likelihood of Zero-Day Attack Detection and Estimation
##plugins.themes.bootstrap3.article.main##
The growing threat to sensitive information stored in computer systems and devices is becoming alarming. This is as a result of the proliferation of different malware created on a daily basis to cause zero-day attacks. Most of the malware whose signatures are known can easily be detected and blocked, however, the unknown malwares are the most dangerous. In this paper a zero-day vulnerability model based on deep-reinforcement learning is presented. The technique employs a Monte Carlo Based Pareto Rule (Deep-RL-MCB-PR) approach that exploits a reward learning and training feature with sparse feature generation and adaptive multi-layered recurrent prediction for the detection and subsequent mitigation of zero-day threats. The new model has been applied to the Kyoto benchmark datasets for intrusion detection systems, and compared to an existing system, that uses a multi-layer protection and a rule-based ranking (RBK) approach to detect a zero-day attack likelihood. Experiments were performed using the dataset, and simulation results show that the Deep-RL-MCB-PR technique when measured with the classification accuracy metrics, produced about 67.77%. The dataset was further magnified, and the result of classification accuracy showed about 75.84%. These results account for a better error response when compared to the RBK technique.
Downloads
References
-
Dalziel, H. (2014). How to defeat advanced malware: new tools for protection and forensics: Syngress.
Google Scholar
1
-
Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection. Journal on Information Security EURASIP, 2018(1), 4.
Google Scholar
2
-
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. In: MIT Press.
Google Scholar
3
-
Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Journal of Science, 313(5786), 504-507.
Google Scholar
4
-
Alazab, M., Venkatraman, S., Watters, P., & Alazab, M. (2011). Zero-day malware detection based on supervised learning algorithms of API call signatures. Paper presented at the Proceedings of the Ninth Australasian Data Mining Conference-Volume 121. 171-181.
Google Scholar
5
-
Jain, P., & Sardana, A. (2012). Defending against internet worms using honeyfarm. Paper presented at the Proceedings of the CUBE International Information Technology Conference.
Google Scholar
6
-
Kaur, R., & Singh, M. (2014). Efficient hybrid technique for detecting zero-day polymorphic worms. Paper presented at the 2014 IEEE International Advance Computing Conference (IACC).
Google Scholar
7
-
Kaur, R., & Singh, M. (2015). A Hybrid Real-Time Zero-day Attack Detection and Analysis System. International Journal of Computer Network and Information Security, 9, 19-31. doi: 10.5815/ijcnis.2015.09.03.
Google Scholar
8
-
Rathore, H., Agarwal, S., Sahay, S. K., & Sewak, M. (2018). Malware Detection Using Machine Learning and Deep Learning. Paper presented at the International Conference on Big Data Analytics.
Google Scholar
9
-
Cordonsky, I., Rosenberg, I., Sicard, G., & David, E. O. (2018). DeepOrigin: End-to-end deep learning for detection of new malware families. Paper presented at the 2018 International Joint Conference on Neural Networks (IJCNN). 1-7.
Google Scholar
10
-
Bhodia, N., Prajapati, P., Di Troia, F., & Stamp, M. (2019). Transfer Learning for Image-Based Malware Classification. arXiv preprint arXiv:1903.11551.
Google Scholar
11
-
Singh, U. K., & Joshi, C. (2018). Scalable approach towards discovery of unknown vulnerabilities. International Journal of Network Security. 20(5), 827-835.
Google Scholar
12
-
Singh, U. K., Joshi, C., & Singh, S. K. (2017). Zero day attacks defense technique for protecting system against unknown vulnerabilities. International Journal of Scientific Research in Computer Science and Engineering. 5(1), 13-18.
Google Scholar
13
-
Page, L., Brin, S., Motwani, R., & Winograd, T. (1999). The PageRank citation ranking: Bringing order to the web. Stanford InfoLab.
Google Scholar
14
-
Song, J., Takakura, H., & Okabe, Y. (2008). Cooperation of intelligent honeypots to detect unknown malicious codes. Paper presented at the 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.
Google Scholar
15
Most read articles by the same author(s)
-
May Tamara Stow,
Chidiebere Ugwu,
Laeticia Onyejegbu,
An Improved Model for Legal Case Text Document Classification , European Journal of Electrical Engineering and Computer Science: Vol. 7 No. 2 (2023)