HMS-IDS: Threat intelligence integration for zero-day exploits and advanced persistent threats in IIoT

K Saurabh, V Sharma, U Singh, R Khondoker… - Arabian Journal for …, 2024 - Springer
Abstract Critical Industries such as Manufacturing, Power, and Intelligent Transportation are
increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter …

From zero-shot machine learning to zero-day attack detection

M Sarhan, S Layeghy, M Gallagher… - International Journal of …, 2023 - Springer
Abstract Machine learning (ML) models have proved efficient in classifying data samples
into their respective categories. The standard ML evaluation methodology assumes that test …

Zero-day malware detection and effective malware analysis using Shapley ensemble boosting and bagging approach

R Kumar, G Subbiah - Sensors, 2022 - mdpi.com
Software products from all vendors have vulnerabilities that can cause a security concern.
Malware is used as a prime exploitation tool to exploit these vulnerabilities. Machine …

A blended deep learning intrusion detection framework for consumable edge-centric iomt industry

JA Alzubi, OA Alzubi, I Qiqieh… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The demand for medical sensors in the Smart Healthcare System (SHS) creates an
intelligent Internet of Medical Things (IoMT) system. This system plays an important role in …

[PDF][PDF] Adopting a Conceptual Architecture to Mitigate an IoT Zero-Day Threat that Might Result in a Zero-Day Attack with Regard to Operational Costs and …

VV Vegesna - International Journal of Current Engineering and …, 2023 - researchgate.net
Internet of Things (IoT) aims at providing connectivity between every computing entity.
However, this facilitation is also leading to more cyber threats which may exploit the …

WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS

A Srivastava, D Sinha, V Kumar - Computers & Security, 2023 - Elsevier
Cyber-attack is one of the alarming issues in today's era. Firewalls, Intrusion Detection
Systems (IDSs), and other techniques are popularly applied to prevent those attacks …

Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography

GS Shyaa, M Al-Zubaidie - Applied Sciences, 2023 - mdpi.com
Electronic-commerce (e-commerce) has become a provider of distinctive services to
individuals and companies due to the speed and flexibility of transferring orders and …

[PDF][PDF] An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks.

F Azzedin, H Suwad, MM Rahman - Computers, Materials & …, 2022 - cdn.techscience.cn
This article presents an asset-based security system where security practitioners build their
systems based on information they own and not solicited by observing attackers' behavior …

Experience report on the challenges and opportunities in securing smartphones against zero-click attacks

N Shafqat, C Topcuoglu, E Kirda… - arXiv preprint arXiv …, 2022 - arxiv.org
Zero-click attacks require no user interaction and typically exploit zero-day (ie, unpatched)
vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root …

An active learning framework using deep Q-network for zero-day attack detection

Y Wu, Y Hu, J Wang, M Feng, A Dong, Y Yang - Computers & Security, 2024 - Elsevier
Zero-day attacks from highly dynamic and complex cyberspace make severe threats to the
existing network intrusion detection systems. Robust and intelligent solutions are required to …