An Attack Graph Based Procedure for Risk Estimation of Zero-Day Attacks

被引:0
|
作者
Keramati, Marjan [1 ]
机构
[1] Semnan Univ, Dept Comp Sci, Semnan, Iran
关键词
Zero day attack; CVSS; Vulnerability; risk assessment;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Performing risk assessment of computer networks is inevitable when doing network hardening. To have efficient attack prevention, risk evaluation must be done in an accurate and quantitative manner. Such risk assessment requires thorough understanding of attack's causes or vulnerabilities and their related characteristics. But the major problem is that, such information is not always provided because, gathering them is time consuming. Also, there are vulnerabilities that are known by attackers but there is no information about them in databases like NVD. Such vulnerabilities are referred to as unknown or zero day attacks. Existing standards like NVD ignore the effect of unknown attacks in risk assessment of networks. Therefore, they cannot have exact evaluation of security improvement in network hardening. In this paper, we proposed an innovative method for predictive risk evaluation of unknown vulnerabilities.
引用
收藏
页码:723 / 728
页数:6
相关论文
共 50 条
  • [1] Detection of Zero-day Attacks on IoT
    Reardon, Shay
    Hssayeni, Murtadha D.
    Mahgoub, Imadeldin
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [2] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    [J]. 2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 200 - 204
  • [3] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 200 - 204
  • [4] A Zero-Day Cloud Timing Channel Attack
    Flowers, Robert
    [J]. IEEE ACCESS, 2022, 10 : 128177 - 128186
  • [5] An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks
    Azzedin, Farag
    Suwad, Husam
    Rahman, Md Mahfuzur
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3003 - 3020
  • [6] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [7] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    [J]. COMPUTER NETWORKS, 2020, 180 (180)
  • [8] Defence against the dark art of zero-day attacks
    Madou, Matias
    [J]. Network Security, 2022, 2022 (11)
  • [9] Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
    Ibrahim Hairab, Belal
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. ELECTRONICS, 2023, 12 (03)
  • [10] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557