Securing Against Zero-Day Attacks: A Machine Learning Approach for Classification and Organizations’ Perception of its Impact
DOI:
https://doi.org/10.51519/journalisi.v5i3.546Keywords:
Zero-day Attack, Machine Learning, Data security, Cyber security, Organizations performanceAbstract
Zero-day malware is a type of malware that exploits system vulnerabilities before it is detected and sealed. This type of malware is a significant threat to enterprise cybersecurity and has tremendous impact on organizations’ performance, as it can spread widely before organizations can clamp down on the threat. Unfortunately, exploit developers can attack system’s vulnerabilities at a pace that is faster than defensive patches. In this research, classification of zero-day attack was carried out. Exploratory Data Analysis (EDA) on malware zero data was conducted. Then feature selection was carried out using Principal Component Analysis (PCA) for the selection of the most important features in the dataset after which a Random Forest (RF) Algorithm was adopted for the classification of zero-day attack. The impact of such attacks was also analyzed, and results were evaluated using confusion matrix and an accuracy of 95% in the classification of zero-day attack with a class error of 3.8% was obtained. A survey of the perception of the potential impacts of these attacks on organization was also carried out. These results indicate efficiency of machine learning algorithm in the classification of attacks as zero-day malware attacks or not. The research also offered pragmatic insights into the perception by organizations of its potential negative impacts and their eagerness to embrace and prioritize proffered cyber security solution(s) to avoid such attacks in order to avert undesirable consequences.
Downloads
References
D. Nandakumar, R. Schiller, C. Redino, K. Choi, A. Rahman, E. Bowen, M. Vucovich, M. Weeks, and A. Shaha, "Zero Day Threat Detection Using Metric Learning Autoencoders," 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), Nassau, Bahamas, 2022, pp. 1318-1325, https://doi: 10.1109/ICMLA55696.2022.00210.
A. Goldsteen, G. Ezov, R. Shmelkin, M. Moffie, and A. Farkash, "Anonymizing machine learning models," in International Workshop on Data Privacy Management, Oct. 2021, pp. 121-136.
F. Abri, S. Siami-Namini, M. A. Khanghah, F. M. Soltani and A. S. Namin, "Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 3252-3259, https://doi: 10.1109/BigData47090.2019.9006514.
Y. Jung, "A review of privacy-preserving human and human activity recognition," Int. J. Smart Sens. Intell. Syst., vol. 13, no. 1, pp. 1-13, 2020.
A. Etuk, J. Anyadighibe, E. James, and R. Mbaka, "Service quality and passengers' loyalty of public transportation companies," British Journal of Management and Marketing Studies, vol. 4, no. 4, pp. 82-98, 2012.
Y. Guo, "A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions”, Comput Commun. 198(C), 175–185, 2023, https://doi:10.1016/j.comcom.2022.11.001.
M. Sarhan, S. Layeghy, M.R. Gallagher, M. Portmann, “From zero-shot machine learning to zero-day attack detection.” Int. J. Inf. Secur. 22, pp. 947–959, 2023. https://doi.org/10.1007/s10207-023-00676-0 [8].
A. Ekong, B. Ekong, A. Edet, “Supervised machine learning model for effective classification of patients with covid-19 symptoms based on bayesian belief network”, Researchers Journal of Science and Technology, vol2: pp. 27 – 33, 2022.
V. C. Victor, C. Ugwu, and O. Laeticia Onyejegbu, "Enhanced Classification Model for Likelihood of Zero-Day Attack Detection and Estimation," European Journal of Electrical Engineering & Computer Science, vol. 5, no. 4, 2021.
S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K.-I. Kim, "Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection," Electronics, vol. 11, no. 23, 2022, Art. no. 3934, https://doi: 10.3390/electronics11233934.
V. T. Victor, C. U. Chidiebere, and O. Laticia, "Comparative Analysis of Dimensionality Reduction Techniques on Datasets for Zero-Day Attack Vulnerability," Journal of Software Engineering and Simulation, vol. 7, no. 8, pp. 48-56, 2021.
J.-Y. Kim, S.-J. Bu, and S.-B. Cho, "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders," Information Sciences, vol. 460, pp. 83-102, 2018.
A. Ekong, E. Udo, O. Ekong, and S. Inyang, "Machine Learning based Model for the Prediction of Fasting Blood Sugar Level towards Cardiovascular Disease Control for the Enhancement of Public Health," International Journal of Computer Applications, vol. 975, pp. 8887.
D. Feaster (2018). Malware Detection. Kaggle. [Online]. Available: https://kaggle.com/competitions/malware-detection.
Verywell Mind. "The Algorithm Problem Solving Approach in PsychologyVerywellMind."[Online].Available: https://www.verywellmind.com/what-is-an-algorithm-2794807. Accessed on: Aug. 24, 2023.
S. S. Raut and S. S. Kulkarni, "Random Forest Modeling for Network Intrusion Detection System," in Procedia Computer Science, vol. 89, pp. 797-803, 2016, doi: 10.1016/j.procs.2016.06.103.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














