Securing Against Zero-Day Attacks: A Machine Learning Approach for Classification and Organizations’ Perception of its Impact
Abstract
Zero-day malware is a type of malware that exploits system vulnerabilities before it is detected and sealed. This type of malware is a significant threat to enterprise cybersecurity and has tremendous impact on organizations’ performance, as it can spread widely before organizations can clamp down on the threat. Unfortunately, exploit developers can attack system’s vulnerabilities at a pace that is faster than defensive patches. In this research, classification of zero-day attack was carried out. Exploratory Data Analysis (EDA) on malware zero data was conducted. Then feature selection was carried out using Principal Component Analysis (PCA) for the selection of the most important features in the dataset after which a Random Forest (RF) Algorithm was adopted for the classification of zero-day attack. The impact of such attacks was also analyzed, and results were evaluated using confusion matrix and an accuracy of 95% in the classification of zero-day attack with a class error of 3.8% was obtained. A survey of the perception of the potential impacts of these attacks on organization was also carried out. These results indicate efficiency of machine learning algorithm in the classification of attacks as zero-day malware attacks or not. The research also offered pragmatic insights into the perception by organizations of its potential negative impacts and their eagerness to embrace and prioritize proffered cyber security solution(s) to avoid such attacks in order to avert undesirable consequences.
Downloads
References
D. Nandakumar, R. Schiller, C. Redino, K. Choi, A. Rahman, E. Bowen, M. Vucovich, M. Weeks, and A. Shaha, "Zero Day Threat Detection Using Metric Learning Autoencoders," 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), Nassau, Bahamas, 2022, pp. 1318-1325, https://doi: 10.1109/ICMLA55696.2022.00210.
A. Goldsteen, G. Ezov, R. Shmelkin, M. Moffie, and A. Farkash, "Anonymizing machine learning models," in International Workshop on Data Privacy Management, Oct. 2021, pp. 121-136.
F. Abri, S. Siami-Namini, M. A. Khanghah, F. M. Soltani and A. S. Namin, "Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy?," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 3252-3259, https://doi: 10.1109/BigData47090.2019.9006514.
Y. Jung, "A review of privacy-preserving human and human activity recognition," Int. J. Smart Sens. Intell. Syst., vol. 13, no. 1, pp. 1-13, 2020.
A. Etuk, J. Anyadighibe, E. James, and R. Mbaka, "Service quality and passengers' loyalty of public transportation companies," British Journal of Management and Marketing Studies, vol. 4, no. 4, pp. 82-98, 2012.
Y. Guo, "A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions”, Comput Commun. 198(C), 175–185, 2023, https://doi:10.1016/j.comcom.2022.11.001.
M. Sarhan, S. Layeghy, M.R. Gallagher, M. Portmann, “From zero-shot machine learning to zero-day attack detection.” Int. J. Inf. Secur. 22, pp. 947–959, 2023. https://doi.org/10.1007/s10207-023-00676-0 [8].
A. Ekong, B. Ekong, A. Edet, “Supervised machine learning model for effective classification of patients with covid-19 symptoms based on bayesian belief network”, Researchers Journal of Science and Technology, vol2: pp. 27 – 33, 2022.
V. C. Victor, C. Ugwu, and O. Laeticia Onyejegbu, "Enhanced Classification Model for Likelihood of Zero-Day Attack Detection and Estimation," European Journal of Electrical Engineering & Computer Science, vol. 5, no. 4, 2021.
S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K.-I. Kim, "Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection," Electronics, vol. 11, no. 23, 2022, Art. no. 3934, https://doi: 10.3390/electronics11233934.
V. T. Victor, C. U. Chidiebere, and O. Laticia, "Comparative Analysis of Dimensionality Reduction Techniques on Datasets for Zero-Day Attack Vulnerability," Journal of Software Engineering and Simulation, vol. 7, no. 8, pp. 48-56, 2021.
J.-Y. Kim, S.-J. Bu, and S.-B. Cho, "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders," Information Sciences, vol. 460, pp. 83-102, 2018.
A. Ekong, E. Udo, O. Ekong, and S. Inyang, "Machine Learning based Model for the Prediction of Fasting Blood Sugar Level towards Cardiovascular Disease Control for the Enhancement of Public Health," International Journal of Computer Applications, vol. 975, pp. 8887.
D. Feaster (2018). Malware Detection. Kaggle. [Online]. Available: https://kaggle.com/competitions/malware-detection.
Verywell Mind. "The Algorithm Problem Solving Approach in PsychologyVerywellMind."[Online].Available: https://www.verywellmind.com/what-is-an-algorithm-2794807. Accessed on: Aug. 24, 2023.
S. S. Raut and S. S. Kulkarni, "Random Forest Modeling for Network Intrusion Detection System," in Procedia Computer Science, vol. 89, pp. 797-803, 2016, doi: 10.1016/j.procs.2016.06.103.


Copyright (c) 2023 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)