• DocumentCode
    626431
  • Title

    Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques

  • Author

    AlEroud, Ahmed ; Karabatis, George

  • Author_Institution
    Dept. of Inf. Syst., Univ. of Maryland, Baltimore, MD, USA
  • fYear
    2013
  • fDate
    18-20 June 2013
  • Firstpage
    159
  • Lastpage
    168
  • Abstract
    Intrusion Detection Systems (IDSs) have been developed for many years, but in general they fall short in efficiently detecting zero-day attacks. A promising approach to this problem is to apply linear data transformation and anomaly detection techniques on top of known attack signatures that convey contextual properties. The linear data transformation technique relies on several discriminant functions, which are used to calculate the estimated probability of zero-day attacks by analyzing network connection features. The anomaly detection technique identifies zero-day attacks using the One Class Nearest Neighbor (1-class NN) algorithm, which has been applied using Singular Value Decomposition (SVD) technique to achieve dimensionality reduction. An experimental prototype has been implemented to evaluate these techniques using data from the NSL-KDD intrusion detection dataset. The results indicate that linear data transformation techniques are quite effective and efficient in detecting zero-day attacks.
  • Keywords
    pattern classification; probability; security of data; singular value decomposition; 1-class NN algorithm; IDS; NSL-KDD intrusion detection dataset; SVD technique; anomaly detection technique; attack probability; attack signature; dimensionality reduction; discriminant function; intrusion detection system; linear data transformation technique; network connection feature; one class nearest neighbor; singular value decomposition; zero-day attack identification; Context; Covariance matrices; Entropy; Feature extraction; Intrusion detection; Probability; Training; Intrusion detection; contextual information; misuse detection; one class nearest neighbor; zero-day attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on
  • Conference_Location
    Gaithersburg, MD
  • Print_ISBN
    978-1-4799-0406-8
  • Type

    conf

  • DOI
    10.1109/SERE.2013.16
  • Filename
    6571706