2015
DOI: 10.5815/ijcnis.2015.09.03
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Real-time Zero-day Attack Detection and Analysis System

Abstract: Abstract-A zero-day attack poses a serious threat to the Internet security as it exploits zero-day vulnerabilities in the computer systems. Attackers take advantage of the unknown nature of zero-day exploits and use them in conjunction with highly sophisticated and targeted attacks to achieve stealthiness with respect to standard intrusion detection techniques. Thus, it's difficult to defend against such attacks. Present research exhibits various issues and is not able to provide complete solution for the dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…The authors of Ref. [37] proposed a zero-day polymorphic worm attack framework for detecting polymorphic worms that are zero-day in nature by their behavior, anomaly, and signature-based techniques. Three layers, namely, analysis, detection, and resource, were used in the proposed architecture.…”
Section: Anomaly-basedmentioning
confidence: 99%
“…The authors of Ref. [37] proposed a zero-day polymorphic worm attack framework for detecting polymorphic worms that are zero-day in nature by their behavior, anomaly, and signature-based techniques. Three layers, namely, analysis, detection, and resource, were used in the proposed architecture.…”
Section: Anomaly-basedmentioning
confidence: 99%
“…In [19], Moustafa et al have proposed an Outlier Dirichlet Mixture (ODM) based detection system for fog. In [20], authors have proposed an architecture to detect zeroday polymorphic worms attack using signature, behavior, and anomaly-based technique. The proposed architecture consists of three layers, namely: detection, analysis and resource layer.…”
Section: Anomaly-basedmentioning
confidence: 99%
“…The wrapper technique assumed an essential part in highlight determination, which prompts high precision contrasted with other examined static methodologies. Ratinder Kaur and Maninder Singh [10]has proposed novel hybrid framework that coordinates inconsistency for identifying and breaking down zero day attaks.the framework is actualized and assessed against different standard measurements True Positive Rate(TPR),False Positive Date(FPR), F-Measure, Total Accuracy(ACC) and Receiver Operating Characteristic(ROC).the outcome indicates high discovery rate with almost zero false positive.to guard against zero day attacks, the exploration group has proposed different procedures. There are partitioned into Statistical based, Signatured based, behavior based and Hybrid strategies.…”
Section: Related Workmentioning
confidence: 99%