AI Navigate

A Novel Solution for Zero-Day Attack Detection in IDS using Self-Attention and Jensen-Shannon Divergence in WGAN-GP

arXiv cs.AI / 3/23/2026

💬 OpinionModels & Research

Key Points

  • The paper proposes SA-WGAN-GP by incorporating a Self-Attention mechanism into Wasserstein GAN with Gradient Penalty to better capture long-range dependencies in network traffic features for IDS.
  • It introduces a JS-WGAN-GP with a Jensen-Shannon divergence-based auxiliary discriminator that is trained with Binary Cross-Entropy and frozen during updates to regularize the generator.
  • The authors combine these into SA-JS-WGAN-GP to enhance data generation quality and diversity for improving IDS generalization to zero-day patterns.
  • They simulate zero-day-like patterns using a leave-one-attack-type-out method on the NSL-KDD dataset and show that the proposed models improve IDS performance and zero-day risk detection compared to baselines.
  • The authors emphasize that data augmentation is not the same as true zero-day discovery, but their approach aims to strengthen IDS robustness against unseen attacks.

Abstract

The increasing sophistication of cyber threats, especially zero-day attacks, poses a significant challenge to cybersecurity. Zero-day attacks exploit unknown vulnerabilities, making them difficult to detect and defend against. Existing approaches patch flaws and deploy an Intrusion Detection System (IDS). Using advanced Wasserstein GANs with Gradient Penalty (WGAN-GP), this paper makes a novel proposition to synthesize network traffic that mimics zero-day patterns, enriching data diversity and improving IDS generalization. SA-WGAN-GP is first introduced, which adds a Self-Attention (SA) mechanism to capture long-range cross-feature dependencies by reshaping the feature vector into tokens after dense projections. A JS-WGAN-GP is then proposed, which adds a Jensen-Shannon (JS) divergence-based auxiliary discriminator that is trained with Binary Cross-Entropy (BCE), frozen during updates, and used to regularize the generator for smoother gradients and higher sample quality. Third, SA-JS-WGAN-GP is created by combining the SA mechanism with JS divergence, thereby enhancing the data generation ability of WGAN-GP. As data augmentation does not equate with true zero-day attack discovery, we emulate zero-day attacks via the leave-one-attack-type-out method on the NSL-KDD dataset for training all GANs and IDS models in the assessment of the effectiveness of the proposed solution. The evaluation results show that integrating SA and JS divergence into WGAN-GP yields superior IDS performance and more effective zero-day risk detection.