Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 16 , Issue 1 , PP: 118-131, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment

Nahla J. Abid 1 , Nawaf Alhebaishi 2 * , Turki Althaqafi 3

  • 1 Department of Computer Science, Taibah University, Madinah, Saudi Arabia - (nabd@taibahu.edu.sa)
  • 2 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia - (nalhebaishi@kau.edu.sa)
  • 3 Computer Science Department, School of Engineering, Computing and Design, Dar Al-Hekma University, Jeddah, Saudi Arabia - (tthaqafi@dah.edu.sa)
  • Doi: https://doi.org/10.54216/JISIoT.160110

    Received: November 21, 2024 Revised: January 04, 2025 Accepted: February 12, 2025
    Abstract

    The Internet of Things (IoT) aims to provide connectivity between all computing entities. However, this facilitates cyberthreats, which exploits the existence of vulnerability over a period. The zero-day threat is one of the vulnerabilities that can result in zero-day attacks that are destructive to the network security and an enterprise. This attack may have potentially compromised critical infrastructure, far-reaching consequences, national security, and even personal privacy. To alleviate the risks, organizations and manufacturers should prioritize proactive security measures, involving robust authentication mechanisms, ongoing monitoring, and timely software updates, to defend the IoT ecosystem from emerging threats. In present scenario, deep learning (DL)-based models have improved robustness in learning data giving it an improved capability to identify unknown information, since it can able to extract knowledge of non-linear data to identify unknown information. The study presents a Robust Zero-Day Attack Detection with Optimal Deep Learning (RZDAD-ODL) technique for the IoT framework. The primary intention of the RZDAD-ODL model lies in the automatic and effectual detection of zero-day attacks in the IoT framework. In the presented RZDAD-ODL technique, the honey badger algorithm (HBA) can be used for the optimum range of the features. Besides, the RZDAD-ODL technique exploits the conditional variational autoencoder (CVAE) model for attack detection and its parameter tuning process can be performed by using a rider optimization algorithm (ROA). The experimentation results of the RZDAD-ODL system can be validated on a benchmark dataset. Extensive comparison studies reported the better attack detection performance of the RZDAD-ODL model over other current techniques.

    Keywords :

    Internet of Things , Zero-day attacks , Deep learning , Feature selection , Cybersecurity

    References

    [1]       R. Ahmad, I. Alsmadi, W. Alhamdani, and L. A. Tawalbeh, “Zero-day attack detection: a systematic literature review,” Artificial Intelligence Review, pp. 1–79, 2023.

    [2]       U. Zahoora, M. Rajarajan, Z. Pan, and A. Khan, “Zero-day ransomware attack detection using deep contractive autoencoder and voting-based ensemble classifier,” Applied Intelligence, vol. 52, no. 12, pp. 13941–13960, 2022.

    [3]       V. Kumar and D. Sinha, “A robust intelligent zero-day cyber-attack detection technique,” Complex & Intelligent Systems, vol. 7, no. 5, pp. 2211–2234, 2021.

    [4]       S. I. Stellios, P. Kotzanikolaou, and M. Psarakis, “Advanced persistent threats and zero-day exploits in the industrial Internet of Things,” in Security and Privacy Trends in the Industrial Internet of Things, pp. 47–68, 2019.

    [5]       M. Sarhan, S. Layeghy, M. Gallagher, and M. Portmann, “From zero-shot machine learning to zero-day attack detection,” International Journal of Information Security, pp. 1–13, 2023.

    [6]       M. Swathy Akshaya and P. Ganapathi, “A review of machine learning methods applied for handling zero-day attacks in the cloud environment,” 2020.

    [7]       B. M. Serinelli, A. Collen, and N. A. Nijdam, “On the analysis of open source datasets: validating IDS implementation for well-known and zero-day attack detection,” Procedia Computer Science, vol. 191, pp. 192–199, 2021.

    [8]       A. Gorbenko and V. Popov, “Zero-Day attacks detection using an analysis of mobile robot motor primitives,” in 2022 International Russian Automation Conference (RusAutoCon), pp. 278–283, IEEE, 2022.

    [9]       S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K. I. Kim, “Comparative evaluation of AI-based techniques for zero-day attacks detection,” Electronics, vol. 11, no. 23, p. 3934, 2022.

    [10]    A. E. Topcu, Y. I. Alzoubi, E. Elbasi, and E. Camalan, “Social media zero-day attack detection using TensorFlow,” Electronics, vol. 12, no. 17, p. 3554, 2023.

    [11]    S. I. Popoola, R. Ande, B. Adebisi, G. Gui, M. Hammoudeh, and O. Jogunola, “Federated deep learning for zero-day botnet attack detection in IoT-edge devices,” IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3930–3944, 2021.

    [12]    S. J. Bu and S. B. Cho, “Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing URL detection,” Electronics, vol. 10, no. 12, p. 1492, 2021.

    [13]    B. I. Hairab, M. S. Elsayed, A. D. Jurcut, and M. A. Azer, “Anomaly detection based on CNN and regularization techniques against zero-day attacks in IoT networks,” IEEE Access, vol. 10, pp. 98427–98440, 2022.

    [14]    A. K. Shukla, “An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network systems,” Wireless Personal Communications, vol. 123, no. 1, pp. 1–29, 2022.

    [15]    X. Cheng, J. Zhang, Y. Tu, and B. Chen, “Cyber situation perception for Internet of Things systems based on zero‐day attack activities recognition within advanced persistent threat,” Concurrency and Computation: Practice and Experience, vol. 34, no. 16, p. e6001, 2022.

    [16]    S. Guo, T. Sivanthi, P. Sommer, M. Kabir-Querrec, N. Coppik, E. Mudgal, and A. Rossotti, “A zero-day container attack detection based on ensemble machine learning,” in 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1–8, IEEE, 2023.

    [17]    H. Hindy, R. Atkinson, C. Tachtatzis, J. N. Colin, E. Bayne, and X. Bellekens, “Towards an effective zero-day attack detection using outlier-based deep learning techniques,” arXiv Preprint, 2020.

    [18]    W. Haider, N. Moustafa, M. Keshk, A. Fernandez, K. K. R. Choo, and A. Wahab, “FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from Linux systems,” Computers & Security, vol. 96, p. 101906, 2020.

    [19]    Y. Luo and Y. Hu, “The coverage improvement of the wireless sensor network based on the parameters optimized Honey Badger Algorithm,” IEEE Access, 2023.

    [20]    T. Chen, X. Liu, B. Xia, W. Wang, and Y. Lai, “Unsupervised anomaly detection of industrial robots using sliding-window convolutional variational autoencoder,” IEEE Access, vol. 8, pp. 47072–47081, 2020.

    [21]    J. Grekow, “Generating polyphonic symbolic emotional music in the style of Bach using convolutional conditional variational autoencoder,” IEEE Access, 2023.

    [22]    S. Baswaraju, V. U. Maheswari, K. K. Chennam, A. Thirumalraj, M. P. Kantipudi, and R. Aluvalu, “Future food production prediction using AROA-based hybrid deep learning model in agri-sector,” Human-Centric Intelligent Systems, pp. 1–16, 2023.

    [23]    B. I. Hairab, H. K. Aslan, M. S. Elsayed, A. D. Jurcut, and M. A. Azer, “Anomaly detection of zero-day attacks based on CNN and regularization techniques,” Electronics, vol. 12, no. 3, p. 573, 2023.

    Cite This Article As :
    J., Nahla. , Alhebaishi, Nawaf. , Althaqafi, Turki. Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2025, pp. 118-131. DOI: https://doi.org/10.54216/JISIoT.160110
    J., N. Alhebaishi, N. Althaqafi, T. (2025). Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment. Journal of Intelligent Systems and Internet of Things, (), 118-131. DOI: https://doi.org/10.54216/JISIoT.160110
    J., Nahla. Alhebaishi, Nawaf. Althaqafi, Turki. Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment. Journal of Intelligent Systems and Internet of Things , no. (2025): 118-131. DOI: https://doi.org/10.54216/JISIoT.160110
    J., N. , Alhebaishi, N. , Althaqafi, T. (2025) . Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment. Journal of Intelligent Systems and Internet of Things , () , 118-131 . DOI: https://doi.org/10.54216/JISIoT.160110
    J. N. , Alhebaishi N. , Althaqafi T. [2025]. Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment. Journal of Intelligent Systems and Internet of Things. (): 118-131. DOI: https://doi.org/10.54216/JISIoT.160110
    J., N. Alhebaishi, N. Althaqafi, T. "Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 118-131, 2025. DOI: https://doi.org/10.54216/JISIoT.160110