2019
DOI: 10.1016/j.jisa.2019.03.011
|View full text |Cite
|
Sign up to set email alerts
|

A framework for zero-day vulnerabilities detection and prioritization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…Attack detection through graphical models has shown a significant improvement over the behavioral-based (or, anomaly-based) attack detection. Recent works [11,[22][23][24][25][26] have used different concepts to implement graphical models. In [27], authors have proposed an anomaly detector using the likelihood ratio of network attacks.…”
Section: Graph-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…Attack detection through graphical models has shown a significant improvement over the behavioral-based (or, anomaly-based) attack detection. Recent works [11,[22][23][24][25][26] have used different concepts to implement graphical models. In [27], authors have proposed an anomaly detector using the likelihood ratio of network attacks.…”
Section: Graph-basedmentioning
confidence: 99%
“…In [23], Wang et al have proposed the DaMask architecture to detect the variants of DDoS attack, which uses Bayesian network inference in which the model gets auto-update according to new observations. In [25], Singh et al have proposed a layered architecture for ZA detection using an attack graph. The layers of the architecture are the ZA path generator, risk analyzer, and physical layer.…”
Section: Graph-basedmentioning
confidence: 99%
“…The exploiting code inserted into the exploiting site by the attacker is a key element that creates an environment of running malicious code in the user's PC, becoming a key asset operated by the attacker. As the intelligent infringement attack exploits the Zero-Day vulnerability [32,33,34], existing security technologies cannot handle the attack properly.…”
Section: B Propagation-based Correlationmentioning
confidence: 99%
“…When Z 12 = 0, Player 1 exerts no effort to develop zero-day capabilities in Period 2; instead, it relies on the stockpiling S 1 from Period 1 to attack Player 2. Solving Player 2 s first-order condition in (7) when…”
Section: Solutions 4-8 (Zmentioning
confidence: 99%