2021
DOI: 10.24018/ejece.2021.5.4.350
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Classification Model for Likelihood of Zero-Day Attack Detection and Estimation

Abstract: The growing threat to sensitive information stored in computer systems and devices is becoming alarming. This is as a result of the proliferation of different malware created on a daily basis to cause zero-day attacks. Most of the malware whose signatures are known can easily be detected and blocked, however, the unknown malwares are the most dangerous. In this paper a zero-day vulnerability model based on deep-reinforcement learning is presented. The technique employs a Monte Carlo Based Pareto Rule (Deep-RL-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…This attack cannot be discovered until it happens, that is the most dreaded part of it. One best way to prevent this kind of cyber-attack is to purchase software products that have passed through series of tests and confirmations from trusted software and programmers should ensure every loophole is sealed in order to avoid attackers from exploiting any vulnerable loophole in an application [9]. People who have cloud storage and use applications or API to read and process data should ensure there is maximum testing for those cloud applications.…”
Section: Introductionmentioning
confidence: 99%
“…This attack cannot be discovered until it happens, that is the most dreaded part of it. One best way to prevent this kind of cyber-attack is to purchase software products that have passed through series of tests and confirmations from trusted software and programmers should ensure every loophole is sealed in order to avoid attackers from exploiting any vulnerable loophole in an application [9]. People who have cloud storage and use applications or API to read and process data should ensure there is maximum testing for those cloud applications.…”
Section: Introductionmentioning
confidence: 99%