2023
DOI: 10.1007/978-981-99-0272-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Inferring System Determining the System State The complexity and scope of the following systems that require maintenance increase, making manual notification management less feasible. Many glitch finding techniques based on automated log analysis have been proposed (Hamid, Iqbal, Aqeel, Liu, et al, 2023) and may eventually replace manually generated notifications, even though they haven't been used frequently in the events we've looked at. A lot of earlier work on anomaly identification takes a generic approach, labeling an event as anomalous.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Inferring System Determining the System State The complexity and scope of the following systems that require maintenance increase, making manual notification management less feasible. Many glitch finding techniques based on automated log analysis have been proposed (Hamid, Iqbal, Aqeel, Liu, et al, 2023) and may eventually replace manually generated notifications, even though they haven't been used frequently in the events we've looked at. A lot of earlier work on anomaly identification takes a generic approach, labeling an event as anomalous.…”
Section: Methodsmentioning
confidence: 99%
“…If the system has several components, faults in the system will result in component failure. Because the system's components interact with one another, the failure of one component may be accountable for causing one or more problems in the system (Hamid, Iqbal, Aqeel, Rana, et al, 2023).…”
Section: Testing Modelsmentioning
confidence: 99%
“…Historical analyses of ransomware mitigation strategies highlighted the initial reliance on signature-based detection methods, which were quickly found to be ineffective against polymorphic and zero-day attacks [26,27,28,29]. The development of behavior-based detection tools represented a significant advancement, offering the ability to identify ransomware based on its actions rather than its signature [1,30,31].…”
Section: Existing Ransomware Detection and Prevention Toolsmentioning
confidence: 99%
“…Researchers fine-tune models like ResNet, InceptionNet, or EfficientNet on Xray images to detect COVID-19. Autoencoders, including convolutional variants, have been utilized to learn compressed representations of normal and COVID-19 X-ray images (Hamid, Iqbal, et al, 2023a). These learned representations can aid in classification tasks.…”
Section: Existing Architecture Frameworkmentioning
confidence: 99%
“…More investigation and discussion are needed on how these circumstances should be handled and how to satisfy both functional and non-functional requirements by resolving them. ML models that are employed to detect COVID-19 may be frequently retrained or adjusted using fresh data (Hamid, Iqbal, et al, 2023b). The model may learn from additional samples of tagged X-ray pictures as they become available, allowing it to detect patterns better and improve detection accuracy.…”
Section: Architecture Evolutionmentioning
confidence: 99%