A Study on Zero-Day Attacks

作者: Swathy Akshaya M , Padmavathi G

DOI: 10.2139/SSRN.3358233

关键词:

摘要: Protecting against zero-day assaults is a standout among the most, basic level testing security issues yet to be illuminated. Zero-day are generally empowered by obscure vulnerabilities. Multi day developing danger corporate systems, since they go undetected through customary mark based safeguards. As opposed depending exclusively on marks, organizations require system that additionally incorporates assurance from multi assaults. Little thought about span and predominance of assaults, which misuse vulnerabilities have not been unveiled freely. Learning new gives digital culprits free assault any objective their personal preference, while staying undetected. Shockingly, these genuine dangers hard break down, in light fact that, when all said done, information isn't accessible until after an found. ordinary barriers thus represented risk systems. Ensuring applications frameworks overwhelming errand for association's people. Data innovation experts will better educated along lines, arranged shield misuses knowing utilizing this data extraordinary condition. This paper explains terminology, lifecycle, challenges with examples different handling mechanisms zero-day.

参考文章(12)
Nisreen Innab, Eman Alomairy, Lamya Alsheddi, Hybrid System Between Anomaly Based Detection System and Honeypot to Detect Zero Day Attack national computer conference. ,(2018) , 10.1109/NCG.2018.8593030
Richard Ciancioso, Danvers Budhwa, Thaier Hayajneh, A Framework for Zero Day Exploit Detection and Containment dependable autonomic and secure computing. pp. 663- 668 ,(2017) , 10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.116
K. Sornalakshmi, Detection of DoS attack and zero day threat with SIEM international conference intelligent computing and control systems. pp. 1- 7 ,(2017) , 10.1109/ICCONS.2017.8250515
Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang, A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). pp. 50- 53 ,(2017) , 10.1109/CYBERC.2017.39
Vivek Bardia, CRS Kumar, End Users Can Mitigate Zero Day Attacks Faster ieee international advance computing conference. pp. 935- 938 ,(2017) , 10.1109/IACC.2017.0190
Marjan Keramati, An attack graph based procedure for risk estimation of zero-day attacks 2016 8th International Symposium on Telecommunications (IST). pp. 723- 728 ,(2016) , 10.1109/ISTEL.2016.7881918
Kartik Palani, Emily Holt, Sean Smith, Invisible and forgotten: Zero-day blooms in the IoT international conference on pervasive computing. pp. 1- 6 ,(2016) , 10.1109/PERCOMW.2016.7457163
Brightstarlang Wanswett, Hemanta Kumar Kalita, The Threat of Obfuscated Zero Day Polymorphic Malwares: An Analysis international conference on computational intelligence and communication networks. pp. 1188- 1193 ,(2015) , 10.1109/CICN.2015.230
Ratinder Kaur, Maninder Singh, Efficient hybrid technique for detecting zero-day polymorphic worms ieee international advance computing conference. pp. 95- 100 ,(2014) , 10.1109/IADCC.2014.6779301
Ratinder Kaur, Maninder Singh, Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks International Conference on Security in Computer Networks and Distributed Systems. pp. 298- 309 ,(2014) , 10.1007/978-3-642-54525-2_27