Benchmarking LLM for Zero-day Vulnerabilities

被引:0
|
作者
Lisha, M. [1 ]
Agarwal, Vedika [2 ]
Kamthania, Supriya [2 ]
Vutkur, Pranav [1 ]
Chari, Madhusoodhana S. [3 ]
机构
[1] Hewlett Packard Enterprise, Cloud Modules, Bengaluru, India
[2] Hewlett Packard Enterprise, Ezmeral R&D, Bengaluru, India
[3] Hewlett Packard Enterprise, Aruba Switching SW, Bengaluru, India
关键词
security; LLM; zero-day; vulnerability;
D O I
10.1109/CONECCT62155.2024.10677338
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Large Language Models (LLMs) have emerged as powerful tools for natural language processing tasks. This paper investigates the efficacy of various LLMs in detecting zero-day vulnerabilities, crucial for preemptive cybersecurity measures. Through benchmarking and experimentation, we analyze the performance of LLMs in unstructured querying scenarios. Our findings aim to enhance understanding of LLM capabilities and contribute to the advancement of vulnerability detection methodologies.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Defence against the dark art of zero-day attacks
    Madou M.
    Network Security, 2022, 2022 (11)
  • [32] Zero-Day Exploits Framework of Supply Chain Networks
    Khandelwal, Abhi
    Mahato, Dharmendra Prasad
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 319 - 335
  • [33] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [34] Big Data Framework for Zero-Day Malware Detection
    Gupta, Deepak
    Rani, Rinkle
    CYBERNETICS AND SYSTEMS, 2018, 49 (02) : 103 - 121
  • [35] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes
    Chen Ting
    Zhang Xiaosong
    Liu Zhi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
  • [36] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [37] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [38] ZEKI: unsupervised zero-day exploit kit intelligence
    Suren, Emre
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (04) : 1859 - 1870
  • [39] Zero-day recovery: the key to mitigating the ransomware threat
    Fagioli A.
    Computer Fraud and Security, 2019, 2019 (01): : 6 - 9
  • [40] Zero-day Virus Transmission Model and Stability Analysis
    Meng Qingwei
    Qiu Minyang
    Wang Gang
    Ma Runnian
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (07) : 1849 - 1855