Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Data Discretization and Decision Boundary Data Point Analysis for Unknown Attack Detection

Full metadata record
DC Field Value Language
dc.contributor.authorShin, Gun-Yoon-
dc.contributor.authorKim, Dong-Wook-
dc.contributor.authorHan, Myung-Mook-
dc.date.accessioned2023-01-06T04:40:06Z-
dc.date.available2023-01-06T04:40:06Z-
dc.date.created2022-12-16-
dc.date.issued2022-10-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/86449-
dc.description.abstractResearchers have continuously sought effective ways to detect unknown (zero-day) cyberattacks in real time. Most current methods rely on pattern-recognition to identify known threats when they appear. Recently, machine learning anomaly detection tools that train a model on normal network data have been used to identify outliers representing unknown attacks. However, detecting unknown attacks is difficult because of a lack of information on unknown attacks, class imbalance in the data, or failure to accurately detect attacks with normal patterns. To overcome these problems, this study applied data discretization and decision-boundary data point analyses to scrutinize patterns near the thresholds of uncertainty. A novel discretization method was used to effectively train a model for the fuzzy c-means feature analysis of data points at the decision boundary, through which adversarial features were detected and classified based on their entropy. Consequently, it was possible to identify incorrectly detected attack data distributed near the model's decision boundary. The NSL-KDD dataset, which is commonly used to evaluate ML intrusion detection systems, was used to evaluate the proposed method. The results showed that our model successfully identified attacks at the decision boundary and that its performance can be improved through classification. In addition, after classification, it was confirmed that the accuracy of detecting DoS attacks improved by 5 to 7%, Probe by 7 to 10%, R2L by 4 to 7%, and U2R by 1 to 9%, compared with that of existing models.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE ACCESS-
dc.titleData Discretization and Decision Boundary Data Point Analysis for Unknown Attack Detection-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000880598100001-
dc.identifier.doi10.1109/ACCESS.2022.3215269-
dc.identifier.bibliographicCitationIEEE ACCESS, v.10, pp.114008 - 114015-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85140777380-
dc.citation.endPage114015-
dc.citation.startPage114008-
dc.citation.titleIEEE ACCESS-
dc.citation.volume10-
dc.contributor.affiliatedAuthorShin, Gun-Yoon-
dc.contributor.affiliatedAuthorKim, Dong-Wook-
dc.contributor.affiliatedAuthorHan, Myung-Mook-
dc.type.docTypeArticle-
dc.subject.keywordAuthorFeature extraction-
dc.subject.keywordAuthorAnomaly detection-
dc.subject.keywordAuthorData models-
dc.subject.keywordAuthorTraining data-
dc.subject.keywordAuthorEntropy-
dc.subject.keywordAuthorGenerative adversarial networks-
dc.subject.keywordAuthorAnalytical models-
dc.subject.keywordAuthorCyberattack-
dc.subject.keywordAuthorData discretization-
dc.subject.keywordAuthordecision boundary-
dc.subject.keywordAuthorfuzzy c-means-
dc.subject.keywordAuthornetwork anomaly detection-
dc.subject.keywordAuthorunknown attack-
dc.subject.keywordPlusANOMALY DETECTION-
dc.subject.keywordPlusINTRUSION DETECTION-
dc.subject.keywordPlusALGORITHM-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 소프트웨어학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Han, Myung Mook photo

Han, Myung Mook
IT (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE