This paper is published in Volume-4, Issue-2, 2018
Area
Information Security
Author
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H
Org/Univ
Valliammai Engineering College, Kattankulathur, Tamil Nadu, India
Keywords
Zero Day Attacks, Security Models, System Calls.
Citations
IEEE
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H. Defending zero day attacks: Resource-based approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H (2018). Defending zero day attacks: Resource-based approach. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H. "Defending zero day attacks: Resource-based approach." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H. Defending zero day attacks: Resource-based approach, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H (2018). Defending zero day attacks: Resource-based approach. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H. "Defending zero day attacks: Resource-based approach." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Abstract
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype. The initial results are promising and indicate that our prototype will achieve its goal of detecting zero-day attacks.