2021
DOI: 10.1007/s40747-021-00396-9
|View full text |Cite
|
Sign up to set email alerts
|

A robust intelligent zero-day cyber-attack detection technique

Abstract: With the introduction of the Internet to the mainstream like e-commerce, online banking, health system and other day-to-day essentials, risk of being exposed to various are increasing exponentially. Zero-day attack(s) targeting unknown vulnerabilities of a software or system opens up further research direction in the field of cyber-attacks. Existing approaches either uses ML/DNN or anomaly-based approach to protect against these attacks. Detecting zero-day attacks through these techniques miss several paramete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(12 citation statements)
references
References 49 publications
0
12
0
Order By: Relevance
“…A zero-day attack refers to a new network signature for Denial of Service (DOS) or Distributed Denial of Service (DDOS). Kumar et al [ 26 ] stated that zero-day attacks are a comparison between genuine network data to find heavy hitters in attack data. A heavy hitter is to find a new signature responsible for DOS or DDOS in network traffic data.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…A zero-day attack refers to a new network signature for Denial of Service (DOS) or Distributed Denial of Service (DDOS). Kumar et al [ 26 ] stated that zero-day attacks are a comparison between genuine network data to find heavy hitters in attack data. A heavy hitter is to find a new signature responsible for DOS or DDOS in network traffic data.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…that security systems have no awareness of existing. The current approach [24,6,12] for detecting these attacks requires consistently analyzing incoming traffic using a plethora of models and artificial intelligence techniques that are designed to detect any anomalies or suspicious activity not present in any up-to-date attack-signature databases.…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…Kumar et al [24] proposes a framework to detect unknown cyber-attacks by introducing a robust intelligent, novel approach following a multi-phase approach to distinguish attacks of both high volumes (HVA), e.g. DoS and DDos, and low volumes (LVA), e.g.…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…In 2021 Kumar and Sinha [104], suggested a novel robust intelligent cyber-attack detection method. The ML and DNN approach are used to defend against anomaly attacks, which are zero-day attacks that target unknown vulnerabilities in systems.…”
Section: Literature Reviewmentioning
confidence: 99%