An Attack Graph Based Procedure for Risk Estimation of Zero-Day Attacks

被引:0
|
作者
Keramati, Marjan [1 ]
机构
[1] Semnan Univ, Dept Comp Sci, Semnan, Iran
关键词
Zero day attack; CVSS; Vulnerability; risk assessment;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Performing risk assessment of computer networks is inevitable when doing network hardening. To have efficient attack prevention, risk evaluation must be done in an accurate and quantitative manner. Such risk assessment requires thorough understanding of attack's causes or vulnerabilities and their related characteristics. But the major problem is that, such information is not always provided because, gathering them is time consuming. Also, there are vulnerabilities that are known by attackers but there is no information about them in databases like NVD. Such vulnerabilities are referred to as unknown or zero day attacks. Existing standards like NVD ignore the effect of unknown attacks in risk assessment of networks. Therefore, they cannot have exact evaluation of security improvement in network hardening. In this paper, we proposed an innovative method for predictive risk evaluation of unknown vulnerabilities.
引用
收藏
页码:723 / 728
页数:6
相关论文
共 50 条
  • [41] A robust intelligent zero-day cyber-attack detection technique
    Vikash Kumar
    Ditipriya Sinha
    [J]. Complex & Intelligent Systems, 2021, 7 : 2211 - 2234
  • [42] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [43] An Architecture of Unknown Attack Detection System against Zero-day Worm
    Kim, Ikkyun
    Kim, Daewon
    Kim, Byoungkoo
    Choi, Yangseo
    Yoon, Seongyong
    Oh, Jintae
    Jang, Jongsoo
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 205 - +
  • [44] An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 322 - 340
  • [45] An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 207 - 218
  • [46] A review of Machine Learning-based zero-day attack detection: Challenges and future directions
    Guo, Yang
    [J]. COMPUTER COMMUNICATIONS, 2023, 198 : 175 - 185
  • [47] Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
    Hindy, Hanan
    Atkinson, Robert
    Tachtatzis, Christos
    Colin, Jean-Noel
    Bayne, Ethan
    Bellekens, Xavier
    [J]. ELECTRONICS, 2020, 9 (10) : 1 - 16
  • [48] Zero-day Attack Identification in Streaming data using Semantics and Spark
    Pallaprolu, Sai C.
    Sankineni, Rishi
    Thevar, Muthukumar
    Karabatis, George
    Wang, Jianwu
    [J]. 2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 121 - 128
  • [49] Deep transductive transfer learning framework for zero-day attack detection
    Sameera, Nerella
    Shashi, M.
    [J]. ICT EXPRESS, 2020, 6 (04): : 361 - 367
  • [50] A robust intelligent zero-day cyber-attack detection technique
    Kumar, Vikash
    Sinha, Ditipriya
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2211 - 2234