MJCS 2022
DOI: 10.58496/mjcs/2022/007
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security

Abstract: Today's digital ecosystem is particularly vulnerable to attacks due to zero-day vulnerabilities. Attackers take advantage of these flaws, which software developers and security experts are unaware of, leading to catastrophic outcomes. Through an analysis of their lifetime, discovery approaches, exploitation methods, disclosure protocols, and patching strategies, this study tries to reveal the danger landscape of zero-day vulnerabilities. We examine the effects of zero-day vulnerabilities on network security an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…This proliferation increases the number of potential entry points for cyber threats, necessitating thorough examination and development of robust mitigation strategies to protect against these emerging vulnerabilities. The increasing reliance on mobile devices for sensitive transactions [11], including banking, shopping, and various online services, has helped in a new era of convenience and accessibility. Managing finances, making purchases, and accessing confidential information on the go with the tap of a screen is convenient.…”
Section: User Behaviormentioning
confidence: 99%
“…This proliferation increases the number of potential entry points for cyber threats, necessitating thorough examination and development of robust mitigation strategies to protect against these emerging vulnerabilities. The increasing reliance on mobile devices for sensitive transactions [11], including banking, shopping, and various online services, has helped in a new era of convenience and accessibility. Managing finances, making purchases, and accessing confidential information on the go with the tap of a screen is convenient.…”
Section: User Behaviormentioning
confidence: 99%
“…Based on the analysis and study of references [21,22], this paper comprehensively examines various intrusion detection techniques, providing valuable references for the author's work. It demonstrates that in the current Internet environment, on the one hand, the increasing popularity of the Internet has led to a rise in the number and complexity of network attacks, making emerging threats critical [23]. On the other hand, various challenges and opportunities arise from applying AutoML in intrusion detection [24].…”
Section: Introductionmentioning
confidence: 99%