Affiliation:
1. Punjab university gujranwala campus, Pakistan
Abstract
Today's digital ecosystem is particularly vulnerable to attacks due to zero-day vulnerabilities. Attackers take advantage of these flaws, which software developers and security experts are unaware of, leading to catastrophic outcomes. Through an analysis of their lifetime, discovery approaches, exploitation methods, disclosure protocols, and patching strategies, this study tries to reveal the danger landscape of zero-day vulnerabilities. We examine the effects of zero-day vulnerabilities on network security and the difficulties that businesses confront by reviewing the relevant literature and discussing actual cases. We also investigate preventative measures and methods of defense, such as intrusion and anomaly detection systems and cutting-edge AI. We stress the need for responsible disclosure, prompt patching, and continued research to counter these difficult to detect dangers. In order to better understand zero-day vulnerabilities, implement countermeasures, and respond to them, this article is an invaluable resource for researchers, security experts, and organizations.
Publisher
Mesopotamian Academic Press
Subject
General Medicine,General Medicine,Materials Chemistry,General Medicine,General Medicine,General Computer Science,General Medicine,Psychiatry and Mental health,Neuropsychology and Physiological Psychology,General Arts and Humanities,General Earth and Planetary Sciences,General Environmental Science
Reference24 articles.
1. [1] U. K. Singh, C. Joshi, and D. Kanellopoulos, "A framework for zero-day vulnerabilities detection and prioritization," Journal of Information Security and Applications, vol. 46, pp. 164-172, 2019.
2. [2] L. Ablon and A. Bogart, Zero days, thousands of nights: The life and times of zero-day vulnerabilities and their exploits. Rand Corporation, 2017.
3. [3] S. H. Abdullah and A. H. Ali, "Radio Frequency Radiation Power Density measurements at Mobile Base Stations in Alam City," Eurasian Journal of Engineering and Technology, vol. 11, pp. 157-166, 2022.
4. [4] Y. Roumani, "Patching zero-day vulnerabilities: an empirical analysis," Journal of Cybersecurity, vol. 7, no. 1, p. tyab023, 2021.
5. [5] A. H. Ali and M. Z. Abdullah, "A novel approach for big data classification based on hybrid parallel dimensionality reduction using spark cluster," Computer Science, vol. 20, no. 4, 2019.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献