Nadia Adnan Shiltagh Al-Jamali, Ahmed R. Zarzoor, H. S. Al-Raweshidy
{"title":"An Effective Technique of Zero-Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method","authors":"Nadia Adnan Shiltagh Al-Jamali, Ahmed R. Zarzoor, H. S. Al-Raweshidy","doi":"10.1049/ntw2.70019","DOIUrl":null,"url":null,"abstract":"<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature-based datasets often perform poorly in ZD detection. A new technique for detecting zero-day (ZD) attacks in IoT-based Conventional Spiking Neural Networks (CSNN), termed ZD-CSNN, is proposed. The model comprises three key levels: (1) Data Pre-processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN-based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD-Deep Learning (ZD-DL) and ZD- Convolutional Neural Network (ZD-CNN). The implementation results demonstrate that ZD- CSNN achieves superior accuracy in detecting zero-day attacks compared to both ZD-DL and ZD-CNN.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2025-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70019","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Networks","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ntw2.70019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature-based datasets often perform poorly in ZD detection. A new technique for detecting zero-day (ZD) attacks in IoT-based Conventional Spiking Neural Networks (CSNN), termed ZD-CSNN, is proposed. The model comprises three key levels: (1) Data Pre-processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN-based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD-Deep Learning (ZD-DL) and ZD- Convolutional Neural Network (ZD-CNN). The implementation results demonstrate that ZD- CSNN achieves superior accuracy in detecting zero-day attacks compared to both ZD-DL and ZD-CNN.
IET NetworksCOMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
5.00
自引率
0.00%
发文量
41
审稿时长
33 weeks
期刊介绍:
IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of networking such as topologies, protocols, routing, relaying and resource-allocation for more efficient and more reliable provision of network services. Topics include, but are not limited to: Network Architecture, Design and Planning, Network Protocol, Software, Analysis, Simulation and Experiment, Network Technologies, Applications and Services, Network Security, Operation and Management.