Comparative analysis of soft computing approaches of zero-day-attack detection

Misbah Anwer, Ghufran Ahmed, Adnan Akhunzada, Shahid Hussain, Mubashir Khan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

The Internet of Things (IoT) is growing in fashion with the concept of connecting everything and connecting everything leads to the security issues and affect the performance. An intrusion detection system (IDS) is a system that scans the network traffic and gives notifications in case of any doubtful activity. To circumvent the challenges in the detection of zero-day-multi-class cyber-attack considering the resource constraint nature of IoT devices, a robust intelligent technique is required to identify zero-day vulnerabilities to create early detection and create patches. A novel framework is proposed that will give flexible, adaptive, cost-effective, scalable, and promising solutions. In this Paper comparative study of proposed solutions were discussed and evaluation of existing system specify that federated learning increases the performance in identification of zero-day-attack.

Original languageEnglish (US)
Title of host publication2022 International Conference on Emerging Trends in Smart Technologies, ICETST 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665459358
DOIs
StatePublished - 2022
Event2022 International Conference on Emerging Trends in Smart Technologies, ICETST 2022 - Karachi, Pakistan
Duration: Sep 23 2022Sep 24 2022

Publication series

Name2022 International Conference on Emerging Trends in Smart Technologies, ICETST 2022

Conference

Conference2022 International Conference on Emerging Trends in Smart Technologies, ICETST 2022
Country/TerritoryPakistan
CityKarachi
Period9/23/229/24/22

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Human-Computer Interaction
  • Software
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Comparative analysis of soft computing approaches of zero-day-attack detection'. Together they form a unique fingerprint.

Cite this