A framework for zero-day vulnerabilities detection and prioritization

作者: Umesh Kumar Singh , Chanchala Joshi , Dimitris Kanellopoulos

DOI: 10.1016/J.JISA.2019.03.011

关键词:

摘要: Abstract Nowadays highly-skilled attackers can find the vulnerabilities of many networked applications. Meanwhile, risk a data breach increases dramatically as software or application vulnerability always remains without patch. By exploiting such (called zero-day), hackers gain entry to target network and steal sensitive data. It is challenging detect zero-day with traditional defenses because signature information in attacks unknown. Consequently, novel security solution required that will discover estimate severity identified vulnerability. In this paper, we propose framework constitutes an integrated approach for detection prioritization (based on likelihood) attacks. The proposed follows probabilistic identification attack path further rank hybrid detection-based technique detects unknown flaws present are not detected yet. To evaluate performance framework, adopted it environment Vikram university campus, India. very promising experimental results showed rate 96% 0.3% false positive rate.

参考文章(14)
Ratinder Kaur, Maninder Singh, Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks International Conference on Security in Computer Networks and Distributed Systems. pp. 298- 309 ,(2014) , 10.1007/978-3-642-54525-2_27
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Ratinder Kaur, Maninder Singh, Efficient hybrid technique for detecting zero-day polymorphic worms ieee international advance computing conference. pp. 95- 100 ,(2014) , 10.1109/IADCC.2014.6779301
Hannes Holm, Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter? hawaii international conference on system sciences. pp. 4895- 4904 ,(2014) , 10.1109/HICSS.2014.600
Yi Yang, Sencun Zhu, Guohong Cao, Improving sensor network immunity under worm attacks Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '08. pp. 149- 158 ,(2008) , 10.1145/1374618.1374640
Vrushank Shah, Kruti j. Pancholi, An analysis of Network Intrusion Detection System using SNORT International Journal for Scientific Research and Development. ,vol. 1, pp. 410- 412 ,(2013)
Chanchala Joshi, Umesh Kumar, A Novel Approach towards Integration of Semantic Web Mining with Link Analysis to Improve the Effectiveness of the Personalized Web International Journal of Computer Applications. ,vol. 128, pp. 1- 5 ,(2015) , 10.5120/IJCA2015906660
Chanchala Joshi, Umesh Kumar, Security Testing and Assessment of Vulnerability Scanners in Quest of Current Information Security Landscape International Journal of Computer Applications. ,vol. 145, pp. 1- 7 ,(2016) , 10.5120/IJCA2016910563
Ruinan Chi, Intrusion Detection System Based on Snort Springer Berlin Heidelberg. pp. 657- 664 ,(2014) , 10.1007/978-3-642-40633-1_82
Umesh Kumar, Chanchala Joshi, Quantifying Security Risk by Critical Network Vulnerabilities Assessment International Journal of Computer Applications. ,vol. 156, pp. 26- 33 ,(2016) , 10.5120/IJCA2016912426