In recent years, there has been significant interest towards mechanisms for detecting cyber-security threats. However, the dynamic nature of modern systems and networks poses significant challenges for threat detection systems exploiting machine learning models, since shifts in data' s statistical distribution over time, known as concept drift, can cause severe performance degradation. In this scenario, traditional static systems often need manual retraining by human operators, leaving networks exposed to vulnerabilities in the interim. Moreover, the challenge of detecting zero-day attacks through semi-supervised or unsupervised models remains a critical aspect that has garnered much attention in the literature. This work introduces an unsupervised online threat detection system designed to identify anomalous traffic indicative of zero-day attacks, while explicitly handling concept drift by automating retraining processes only when necessary. An extensive experimental evaluation on the real-world IoT-23 dataset, encompassing network traffic from IoT devices and malicious traffic from malware-infected devices, showcases the system' s efficacy, showing superior performance in real-time threat detection compared to traditional static approaches.

De Paola A., Drago S., Ferraro P., Lo Re G. (2024). Detecting Zero-Day Attacks under Concept Drift: An Online Unsupervised Threat Detection System. In CEUR Workshop Proceedings. CEUR-WS.

Detecting Zero-Day Attacks under Concept Drift: An Online Unsupervised Threat Detection System

De Paola A.;Drago S.;Ferraro P.
;
Lo Re G.
2024-01-01

Abstract

In recent years, there has been significant interest towards mechanisms for detecting cyber-security threats. However, the dynamic nature of modern systems and networks poses significant challenges for threat detection systems exploiting machine learning models, since shifts in data' s statistical distribution over time, known as concept drift, can cause severe performance degradation. In this scenario, traditional static systems often need manual retraining by human operators, leaving networks exposed to vulnerabilities in the interim. Moreover, the challenge of detecting zero-day attacks through semi-supervised or unsupervised models remains a critical aspect that has garnered much attention in the literature. This work introduces an unsupervised online threat detection system designed to identify anomalous traffic indicative of zero-day attacks, while explicitly handling concept drift by automating retraining processes only when necessary. An extensive experimental evaluation on the real-world IoT-23 dataset, encompassing network traffic from IoT devices and malicious traffic from malware-infected devices, showcases the system' s efficacy, showing superior performance in real-time threat detection compared to traditional static approaches.
2024
De Paola A., Drago S., Ferraro P., Lo Re G. (2024). Detecting Zero-Day Attacks under Concept Drift: An Online Unsupervised Threat Detection System. In CEUR Workshop Proceedings. CEUR-WS.
File in questo prodotto:
File Dimensione Formato  
ITASEC24 PAPER + TOC.pdf

accesso aperto

Descrizione: paper + TOC
Tipologia: Versione Editoriale
Dimensione 2.3 MB
Formato Adobe PDF
2.3 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10447/664063
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact