Zero-Day Threats Detection for Critical Infrastructures

نویسندگان

چکیده

Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase volume information flowing through critical systems. As a result, protecting infrastructures from intrusions security threats has become paramount concern field intrusion detection systems (IDS). To address this concern, research paper focuses on importance defending against threats. It proposes computational framework that incorporates feature selection fuzzification. The effectiveness performance proposed are evaluated using NSL-KDD UGRansome datasets combination with selected machine learning (ML) models. findings study highlight fuzzy logic use ensemble enhance ML identifies Random Forest (RF) Extreme Gradient Boosting (XGB) top-performing algorithms detect zero-day attacks. results obtained implemented outperform previous methods documented IDS literature, reaffirming significance safeguarding

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Security Threats to Safety-critical, Space-based Infrastructures

Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of s...

متن کامل

N-Version Programming for the Detection of Zero-day Exploits

Using N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we d...

متن کامل

One Class Model Training for Zero-Day Virus Detection

The big ideas to write about in this introductory section is a) this is an improvement over prior MEF version that was based upon training models to detect new viruses using examples of known viruses and known benign attachments. This is hard to do in practice since one needs good examples of benign attachments that may be hard to sample, and also expensive in practice and b) this version train...

متن کامل

An Adaptive Real-Time Architecture for Zero-Day Threat Detection

Attackers create new threats and constantly change their behavior to mislead security systems. In this paper, we propose an adaptive threat detection architecture that trains its detection models in real time. The major contributions of the proposed architecture are: i) gather data about zero-day attacks and attacker behavior using honeypots in the network; ii) process data in real time and ach...

متن کامل

islanding detection methods for microgrids

امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications in computer and information science

سال: 2023

ISSN: ['1865-0937', '1865-0929']

DOI: https://doi.org/10.1007/978-3-031-39652-6_3