You are on page 1of 5

Comparative analysis of soft computing approaches

of zero-day-attack detection
Misbah Anwer Ghufran Ahmed Adnan Akhunzada Shahid Hussain Mubashir khan
dept. of computer dept. of computer science Faculty of Computing and dept. of computer dept. of computer science
science FAST-NUCES Informatics science NEDUET
2022 International Conference on Emerging Trends in Smart Technologies (ICETST) | 978-1-6654-5935-8/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICETST55735.2022.9922937

FAST-NUCES Karachi, Pakistan University Malaysia Sabah Penn state Karachi, Pakistan
Karachi, Pakistan ghufran.ahmed@nu.edu.pk Kota Kinabalu, Malaysia university mmkhan@cloud.neduet.edu.pk
k200992@nu.edu.pk akhunzadaadnan@gmail.com Pennsylvania, USA
shussain@psu.edu

Abstract—The Internet of Things (IoT) is growing in and focused on the need to rigorously examine the defense
fashion with the concept of connecting everything and of IoT systems. An intruder's intention is to harm the system
connecting everything leads to the security issues and affect by launching some attacks to find loopholes in a network
the performance. An intrusion detection system (IDS) is a and get benefits from sensitive information. Industrial IoT
system that scans the network traffic and gives notifications in
(IIoT) came out when IoT devices gained approval by
case of any doubtful activity. To circumvent the challenges in
the detection of zero-day-multi- class cyber-attack considering interconnecting machines, sensors, and actuators in an
the resource constraint nature of IoT devices, a robust industry setting.
intelligent technique is required to identify zero- day A. IIoT Security
vulnerabilities to create early detection and create patches. A
novel framework is proposed that will give flexible, adaptive, Rapid technological advancement has made the internet
cost-effective, scalable, and promising solutions. In this Paper simply accessible and it has been vigorously used. Many
comparative study of proposed solutions were discussed and sensitive activities like communication, information
evaluation of existing system specify that federated learning
exchange, and business dealings have been carried out
increases the performance in identification of zero-day-attack.
through the internet which helps faster connection and
Keywords—Zero-day, attack detection, soft computing, IoT communication. However, integrity and privacy can be
violated and compromised by hackers who seek to damage
I. INTRODUCTION
and disrupt network connectionsand security. The number of
The Internet of Things (IoT) is growing in fashion attacks targeting networks has been growing over time. This
with the concept of connecting everything [1].This brings the
idea of smart systems in education, health, and industry. leadsto a need to examine the attacks and develop morerobust
These systems are creating huge amounts of data from security protection tools. Every association, industry, and
different devices and thus required IoT security for known government needs network security solutions to keep
and unknown attacks. The aim of IoT is to improve people’s systems away from the ever-growing danger of cyber-
day-to-day life by giving smart devices and applications and attacks. The need for an effective and stable networksecurity
to improve the industry. There approx. 50 billion IoT devices system to save business and end users’ data has been rising
connect to the internet and this will exponentially increase in as the protection from network attacks is very limited.. IoT
the near future. There is a challenge to detect zero-day-multi-
and IIoT(industrial IoT) is a system of interconnected digital
class cyber-attack in IoT networks to optimize the
identification of zero day. These devices are connected to the machines or devices, objects, animals, or people. Anything
universal internet with an unripe transmission medium that (smartphone, laptop, wearable gadgets, etc.) that has the
shows the potential threat [2]. A novel framework is capability to connect and share data over the network. These
proposed to overcome the challenges in the detection of zero- devices are used in healthcare monitoring, smart vehicles,
day-cyber-attack. Existing work cannot optimize the zero- surveillance, and robots. In this era, almost all things get
day attack efficiently. To cope with this issue hybrid or digitized and the use of the internet is at its peak. There is no
ensemble collaborative learning is required. The IoT devices
concept of life without the internet, and everything gets
are connected to billions of devices and data shared among
the devices leads to compromising and sacrificing security. connected which in turn causes security breaches on
There is a need for a mechanism to protect the system and networks [9].The modern era uses smart devices and
improve security. believes in autonomous systems [4]. These systems generate
trillions of data and information. Hackers are using such
II. SECURITY IN IOT data for cyber-attacks. Currently, researchers have been
IoT leads to crucial security challenges as more security trying to propose solutions to secure the IIoT systems in
is required for smart devices [1]. IoT devices have gained which large amounts of data from different sensors and
popularity over the past few years. Due to their vulnerable actuators are propagating. It faces different cyberattacks
nature, these devices are at high risk and preventive from the outside world resulting in a lack of performance and
measures of security are required to protect and prevent trust. These systems basically contain sensitive information
them from attackers. In [14], the authors presented a survey causing the theft of delicate information. The link between

978-1-6654-5935-8/22/$31.00 ©2022 IEEE

Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on January 20,2024 at 15:01:14 UTC from IEEE Xplore. Restrictions apply.
information technology and organizational technology opens avoid further attacks due to such a glitch. In [10], the
a way to attack,hence, systems get vulnerable. authors proposed a robust intelligent zero-day-cyber-attack
detection technique by merging heavy-hitters and graph
B. Cyber-attacks on IoT and IIoT devices techniques. In COVID19 there is a rapid increase in cyber-
Security of IoT devices is of great concern and there is a attacks. To circumvent this situation, the authors proposed
novel techniques to protect the network from zero-day-
need to prevent these devices from cyber threats in
cyber-attacks by detecting unknown high-volume attacks
education, business, health, and other areas [6]. To
like denial of services and distributed denial of services as
sufficiently organize such threats, a pertinent hierarchy is well as low-volume attacks like data theft and scanning.
required to be aware and protect people. Since the initiation
of computers, cybersecurity has been a serious objective to B. Federated deep learning
handle. The exponential increasing trend of connected For zero-day attack detection, the Federated Learning
devices ensures the threat of devices being compromised. . method was used [12] in IoT edge devices without breaching
the security. Deep neural networks classify the network
III. LITERATURE REVIEW traffic while (Federated Average) FedAvg algorithm updates
the aggregation of the local DNN model. This method is
simulated with the Bot- IoT and N-BaIoT datasets to find the
In this section, State-of-the-art studies are discussed related accuracy, precision, recall, and F1 score. It is also compared
to the zero-day attack in IoT and IIoT, its increasing trend, with State-of-the-art deep learning models i.e., centralized
techniques to detect the zero-day attack, and a comparison deep learning, localized deep learning, and distributed deep
of related work. learning. The limitation of this work is to enhance the
A. Zero-day cyber-Attack classification performance of intrusion detection systems.
A zero-day attack (ZA) is a cyber-attack exploiting A list of Federated learning vulnerabilities mentioned
vulnerability that has not been disclosed publicly. The zero- in[5] are poisoning, evasion and backdoor attacks, non-
day attack exploits a previously unknown vulnerability in robust aggregation, compromised distributed aggregation,
computer applications. The zero-day attacks are undetected inference attack, and malicious server.
by vendors and developers. Many efforts have been made in
the literature to detect known vulnerabilities using machine
learning and deep learning techniques 15]. An Intrusion
Detection System (IDS) does not prove to detect the zero-
day unknown attack. Zero-day attacks have been drastically
increasing. These susceptibilities are known to the attacker
and the vendor is unknown of this vulnerability. The
attacker exploits it and takes advantage of it. Once a
developer gets to know about this issue, he creates a patch to

TABLE I. SHOWS THE COMPARISON OF RELATED WORK


Paper Published Dataset IoT Zero-day Main contribution Limitations/ Learning
scenario
Traffic Future work

IoT attack detection using FDL to speed upthe Transfer


IEEE Access, IoT devices yes No DTL with auto encoders process Learning
[16]

FL method forzero-day Performance of Federated


IEEE IoT Bot- botnet attack detection. FL Learning
[12] journals Yes Yes
IoT,N-

BaIoT

NN requires higher traffic Performance of Hybrid


Complex and for correct prediction. multi-class
[10] intelligent sys, classification
CICIDS 18 No Yes Novel zero- day-cyber-
Springer
attack techniques using HH The exact category of
andGraph. LVAvariants is not
detected
Detect Zero- day(unknown) Validation of Unsupervis
IEEE SDN20 No Yes attacks with unsupervised techniques on a ed
[15] anomaly detection algorithms public dataset
Access with the adoption of meta-
learning.

Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on January 20,2024 at 15:01:14 UTC from IEEE Xplore. Restrictions apply.
Reinforce
Journal Of Info NSL-KDD No Yes Ids using RL Does not consider ment
[13] SecApp2021(Wcat) computational and Learning
network cost

Table 1 specify the comparison of zero day scenarios used in previous work with and without different IoT based datasets
also showing the limitations and future direction. Transfer and federated learning was used to evaluate the traffic and Table 2
provide the performance measures of ARP_MITM (6 GB ) dataset on different layers with different batch sizes.

TABLE II. SHOWS THE ACCURACY AND LOSS OF TEST AND TRAIN

Data Epoch Batch Layers Loss Train Test Time (Minutes)


Size Accuracy Accuracy

2500k 1 32 3 0.0153 0.9946 99.461 % 22

2500k 1 64 4 0.0091 0.9956 99.46 % 40

2500k 10 500 1 0.02502 0.9969 99.62 % 22

2500k 30 1000 2 0.0221 0.9971 99.69 % 45

2500k 50 1000 3 0.0183 0.9979 99.80 % 71

IV. PPROPOSED METHODOLOGY uses ROC, as mentioned in Fig.4, Receiver Operating Curve
Graph. True positive and true negative are the two
In this section, various ideas to solve the main problems parameters of this curve. Fig. 4. shows the ROC curve and
associated with zero-day cyber-attackswill be discussed. ROC rates of true positives and true negatives. The same
measures will be evaluated for future tasks.
A. Initial Implementation
V. PPROPOSED FRAMEWORK
The initial step was taken for intrusion detection using the The framework consists of collaborative learning and mixed
state-of-the-art kitsune [3] dataset “Arp- Mitm” containing supervised and unsupervised learning using edge or fog
approx.250 lac records and 115 features. A hybrid servers. Data collected from IIoT sensors and proceed to
deeplearning supervised technique was implemented on a learn algorithms to process the network traffic to gateways
6Gb dataset with 70 and 30 train and test ratios (edge or fog). In the control plane, centralized servers will
respectively. long short-term memory (LSTM) and CuDNN be used that endure the burden on servers and not on
LSTM were implemented. Table 2 shows the result of train sensors. Decentralized on the data plane and there will be no
and test accuracy. such burden on sensors. unsupervised learning is
computationally un intensive. This novel approach will
B. Evaluatiom Metrics exhaust the burden on underlying devices.
To evaluate the existing algorithm and to compare the
A. Optimized detection of Zero-day-cyber attacks using
proposed approach with state-of-the- art techniques
Reinforcement learning
accuracy, precision, recall, and F1 score will be measured
and compared with other techniques. Fig 3 shows the This solution is motivated by [7,13]. In this solution IoT
comparison of KDD and Arp-Mitm datasets. To show the devices will be considered for optimized zero-day attack
performance of the classification model at all thresholds (ZA) unknown attack while considering computational and

Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on January 20,2024 at 15:01:14 UTC from IEEE Xplore. Restrictions apply.
network costs including delays in IoT and IIoT devices. The learning and federated learning with a new hybrid algorithm
first step of the system will check all the routers and using the FL framework to fully address the issues of ZA
gateways are not compromised and without relying on the detection for the IIoT network. Federated learning is
assumption of an ideal situation. Then apply Deep decentralized learning in which all the nodes learn locally
reinforcement learning for attention-based techniques on and then share the information and do not preserve data on
IoT devices. To improve the efficiency of detecting ZA with the edge devices [5,8] mention the problems and
high performance on IDS IoT-based dataset was used. vulnerabilities of federated learning with zero knowledge
Applying deep reinforcement learning techniques on proof suggested by [5] for higher performance and fully
industrial IoTs to detect unknown cyber-attacks and address the ZA detection issues.
improve the positive rewards and reduce the false alarm rate
by initially evaluating the existing work and then comparing
the result with state-of-the-art datasets and techniques.

Fig.1,2 and 3 shows the comparison of two datasets, model


accuracy and loss, and AUC(ROC) curve respectively.

Fig. 2.mentioning comparison of two datasets[3].

Fig. 3. Shows area under the curve[3].


Fig. 1.shows model accuracy and loss [3].

CONCLUSION
B. Using federated learning for ZA detectionwhile fixing The iot is growing in fashion with the concept of connecting
the vulnerabilities of FL. everything. the iot is an interdependent device that can send
In [16] detect the ZA by introducing deep transfer learning and receive information on a network of physical and
for IoT network attack detection but this technique is taking embedded devices through the internet. iot leads to crucial
much time to train the model consequently slowing down security challenges as more security is required for smart
the process. In this solution, federated learning techniques devices. the industrial iot (iiot) evolves modern research
will be used to enhance the process. then combine the deep pace to secure the iiot systems due to propagating large

Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on January 20,2024 at 15:01:14 UTC from IEEE Xplore. Restrictions apply.
amounts of data from different sensors and actuators and it conference on pervasive computing and communication workshops
(PerCom) (pp. 1-6).
is facing different cyberattacks from the outside world
[12] Popoola, S. I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M., &
resulting in a lack of performance and trust zero-day attack Jogunola, O. (2021).” Federated deep learning for zero-day botnet
is a cyber-attack exploiting a vulnerability that has not been attack detection in IoT edge devices.” IEEE Internet of Things
disclosed publicly. the zero-day attack exploits a previously Journal.
unknown vulnerability in computer applications. zero-day- [13] Sethi, K., Madhav, Y. V., Kumar, R., & Bera, P. (2021). “Attention-
cyber-attack is a critical and crucial issue in iot and iiot based multi-agent intrusion detection using reinforcement learning.
“Journalof Information Security and Applications, 61, 102923.
when all the devices are connected with each other through
[14] Shah, Y., & Sengupta, S. (2020, October).” A survey on
the internet and it is generating a massive volume of data, Classification of Cyber-attacks on IoTand IIoT devices.” In 2020 11th
there are potential security threats. Detection and IEEE Annual Ubiquitous Computing, Electronics & Mobile
identification of zero-day in the industrial internet of things Communication Conference (UEMCON) (pp. 0406-0413). IEEE
is still a challenge, many efforts made previously but the [15] Zoppi, T., Ceccarelli, A., & Bondavalli, A. (2021). “Unsupervised
results are not up to the mark and device vulnerabilities are algorithms to detect zero-day attacks: Strategy and application.” IEEE
Access, 9, 90603-90615.
increasing exponentially. Identifying zero-day vulnerability
[16] Vu, L., Nguyen, Q. U., Nguyen, D. N., Hoang,D. T., &
in IoT is a challenge, to cope with these unavoidable Dutkiewicz, E. (2020). “Deep transfer learning for IoT
challenge problems and issues of federated learning will be attack detection”. IEEE Access, 8,107335-107344.
circumvented initially. then implement federated learning on
IoT-based intrusion detection system dataset to evaluate the
performance. IDS IoT datasets were evaluated and
examined by deep reinforcement learning techniques to
improve the detection of ZA and reduce the false alarm rate.
Then a hybrid ensemble federated learning framework will
be used considering the new vulnerabilities and problems in
this new paradigm FL to handle the challenges of FL.
Comparison with state-of-the- art techniques will be
evaluated. The proposed hybrid approaches are expected to
improve the generalization performance of zero-day-cyber-
attack for IoT networks.
REFERENCES

[1] Ali, M., Siddique, A., Hussain, A., Hassan, F., Ijaz, A., & Mehmood,
A. A Sustainable Framework for Preventing IoT Systems from Zero
Day DDoS Attacks by Machine Learning.
[2] Alsoufi, M. A., Razak, S., Siraj, M. M., Nafea, I., Ghaleb, F. A.,
Saeed, F., & Nasser, M. (2021). Anomaly-based intrusion detection
systems in IoT using deep learning: A systematic literature review.
Applied Sciences, 11(18), 8383
[3] Anwer, M., Ahmed, G., Akhunzada, A., & Siddiqui, S. (2021,
October). Intrusion Detection Using Deep Learning. In 2021
International Conference on Electrical, Computer, Communication
and Mechatronics Engineering (ICECCME) (pp. 1-6). IEEE.
[4] Awotunde, J. B., Chakraborty, C., & Adeniyi, A. E. (2021).”
Intrusion detection in industrial internet of things network-based on
deep learning models with rule-based feature selection.” Wireless
communication and mobile computing, 2021.
[5] Bouacida, N., & Mohapatra, P. (2021). Vulnerabilities in Federated
Learning. IEEE Access,9, 63229-63249
[6] Gajek, S., Lees, M., & Jansen, C. (2020). IIoT and cyber-resilience.
[7] Gülmez, H. G., & Angin, P. (2021).” A Study on the Efficacy of
Deep Reinforcement Learning for Intrusion Detection. “Sakarya
University Journal of Computer and Information Sciences, 4(1), 11-
25.AI & SOCIETY, 1-11.
[8] Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M.,
Bhagoji, A. N., ... & Zhao, S. (2019). Advances and open problems in
federated learning. arXiv preprint arXiv:1912.04977.
[9] Khraisat, A., & Alazab, A. (2021). A critical review of intrusion
detection systems in the internet of things: techniques, deployment
strategy, validation strategy, attacks, public dataset and challenges.
Cybersecurity, 4(1), 1-27.
[10] Kumar, V., & Sinha, D. (2021). “A robust intelligent zero-day cyber-
attack detection technique.” Complex & Intelligent Systems, 1-24.
ersecurity, 4(1), 1-27.
[11] Palani, K., Holt, E., & Smith, S. (2016, March). Invisible and
forgotten: Zero-day blooms in the IoT. In 2016 IEEE international

Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on January 20,2024 at 15:01:14 UTC from IEEE Xplore. Restrictions apply.

You might also like