Zero-Day Threats Detection for Critical Infrastructures
نویسندگان
چکیده
Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase volume information flowing through critical systems. As a result, protecting infrastructures from intrusions security threats has become paramount concern field intrusion detection systems (IDS). To address this concern, research paper focuses on importance defending against threats. It proposes computational framework that incorporates feature selection fuzzification. The effectiveness performance proposed are evaluated using NSL-KDD UGRansome datasets combination with selected machine learning (ML) models. findings study highlight fuzzy logic use ensemble enhance ML identifies Random Forest (RF) Extreme Gradient Boosting (XGB) top-performing algorithms detect zero-day attacks. results obtained implemented outperform previous methods documented IDS literature, reaffirming significance safeguarding
منابع مشابه
Cyber Security Threats to Safety-critical, Space-based Infrastructures
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of s...
متن کاملN-Version Programming for the Detection of Zero-day Exploits
Using N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we d...
متن کاملOne Class Model Training for Zero-Day Virus Detection
The big ideas to write about in this introductory section is a) this is an improvement over prior MEF version that was based upon training models to detect new viruses using examples of known viruses and known benign attachments. This is hard to do in practice since one needs good examples of benign attachments that may be hard to sample, and also expensive in practice and b) this version train...
متن کاملAn Adaptive Real-Time Architecture for Zero-Day Threat Detection
Attackers create new threats and constantly change their behavior to mislead security systems. In this paper, we propose an adaptive threat detection architecture that trains its detection models in real time. The major contributions of the proposed architecture are: i) gather data about zero-day attacks and attacker behavior using honeypots in the network; ii) process data in real time and ach...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications in computer and information science
سال: 2023
ISSN: ['1865-0937', '1865-0929']
DOI: https://doi.org/10.1007/978-3-031-39652-6_3