Zero-day attack detection with deep learning

Download
2019
Çakır, Berna
The rise of the IoT paradigm in the past decade has resulted in an unprecedented number of zero-day attacks launched against IoT systems, which are capable of causing major damages. Deep learning has recently become a popular technique for many learning tasks including intrusion detection, with high potential to detect zero-day attacks in addition to ones with well-known signatures. In this thesis, we analyzed the efficacy of supervised and unsupervised deep learning algorithms for detecting zero-day attacks. We experimented with different neural network architectures including fully connected, recurrent and temporal convolutional models. The proposed deep learning models were proven to be effective in intrusion detection with achievement of 95.3% classification accuracy and 97% f1-score. The models were tested on datasets created using the same environment with the training dataset as well as datasets created in different environments through transfer learning. The tests on the datasets, which were created in different environments showed that deep learning algorithms are capable of detecting some of the attacks with low false positive rates.

Suggestions

Real-time intrusion detection and prevention system for SDN-based IoT networks
Sarıça, Alper Kaan; Angın, Pelin; Department of Computer Engineering (2021-9)
The significant advances in wireless networks with the 5G networks have made possible a variety of new IoT use cases. 5G and beyond networks will significantly rely on network virtualization technologies such as SDN and NFV. The prevalence of IoT and the large attack surface it has created calls for SDN-based intelligent security solutions that achieve real-time, automated intrusion detection and mitigation. In this thesis, we propose a real-time intrusion detection and mitigation system for SDN, which aims...
Explainable Security in SDN-Based IoT Networks
Sarica, Alper Kaan; Angın, Pelin (2020-12-01)
The significant advances in wireless networks in the past decade have made a variety of Internet of Things (IoT) use cases possible, greatly facilitating many operations in our daily lives. IoT is only expected to grow with 5G and beyond networks, which will primarily rely on software-defined networking (SDN) and network functions virtualization for achieving the promised quality of service. The prevalence of IoT and the large attack surface that it has created calls for SDN-based intelligent security solut...
Zamansal Evrişimli Ağlarla Saldırı Tespiti: Karşılaştırmalı Bir Analiz
ÇAKIR, BERNA; Angın, Pelin (2021-01-01)
Son yıllarda Nesnelerin İnterneti paradigmasının hızlı yükselişi ve bu yükselişin yarattığı büyük siber saldırı yüzeyi, otomatik saldırı tespit sistemlerinin önemini arttırmıştır. Özellikle daha önce gözlenmemiş sıfırıncı gün saldırılarının tespitinde klasik imza tabanlı saldırı tespit sistemleri yetersiz kalmaktadır. Bu durum siber güvenlik araştırmacılarını özellikle anomali tespiti için makine öğrenme tabanlı yöntemlere yönlendirmiştir. Literatürde derin öğrenme yöntemlerini bilgisayar ağlarında saldırı ...
Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
Al-Turjman, Fadi; Ever, Yoney Kirsal; Ever, Enver; Nguyen, Huan X.; David, Deebak Bakkiam (Institute of Electrical and Electronics Engineers (IEEE), 2017-01-01)
Recently, the Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT-based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since enabling technologies have restricted authentication privileges for mobile users, in this paper, a strategy of mobile-sink is introduced for the extension of use...
Finite-horizon online energy-efficient transmission scheduling schemes for communication links
Bacınoğlu, Baran Tan; Uysal Bıyıkoğlu, Elif; Department of Electrical and Electronics Engineering (2013)
The proliferation of embedded systems, mobile devices, wireless sensor applications and increasing global demand for energy directed research attention toward self-sustainable and environmentally friendly systems. In the field of communications, this new trend pointed out the need for study of energy constrained communication and networking. Particularly, in the literature, energy efficient transmission schemes have been well studied for various cases. However, fundamental results have been obtained mostly ...
Citation Formats
B. Çakır, “Zero-day attack detection with deep learning,” Thesis (M.S.) -- Graduate School of Natural and Applied Sciences. Computer Engineering., Middle East Technical University, 2019.