Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure DOI Open Access

Azheen Waheed,

Bhavish Seegolam,

Mohammad Faizaan Jowaheer

и другие.

Опубликована: Июль 29, 2024

Zero-day threats are a more severe and constantly developing menace to various participants including large companies, government offices, educational establishments. These entities may contain valuable information essential operations that attract cyber attackers. exploits especially devastating as they target weaknesses an organization’s vendors not even aware of, making them have no protection against them. This paper focuses on the background use of zero-day exploitation structure technologies these complex malware attacks. We examine two notable real-life cases: case ‘HAFNIUM targeting Exchange Servers with exploits’ was investigated by Microsoft 365 Security Threat Intelligence, ‘Log4j vulnerability’ reported National Cyber Centre. cases show critical effects vulnerabilities measures taken combat Additionally, this outlines different strategies can be used prevent attacks help modern technologies. fast patch release, effective IDS/IPS, security model involves constant vigilance behavioral analytics. Thus, studying lifecycle exploits, one enhance organization invisible traditional systems. extensive survey is designed useful in understanding characteristics vulnerabilities, for their mitigation, threat development field cybersecurity. it possible strengthen develop time analyzing previous events predicting potential problems.

Язык: Английский

Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet) DOI Creative Commons
Ahmed A. Mohamed, Abdullah Alsaleh, Purushottam Sharma

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Фев. 3, 2025

This paper introduces a new probabilistic composite model for the detection of zero-day exploits targeting capabilities existing anomaly systems in terms accuracy, computational time, and adaptability. To address issues mentioned above, proposed framework consisted three novel elements. The first key innovations are introduction "Adaptive WavePCA-Autoencoder (AWPA)" pre-processing stage which denoising dimensionality reduction, contributes to general dependability accuracy exploit detection. Additionally, "Meta-Attention Transformer Autoencoder (MATA)" enhancing feature extraction subtlety issue, improves model's ability flexibility detect security threats, "Genetic Mongoose-Chameleon Optimization (GMCO)" was introduced effective selection case addressing efficiency challenges. Furthermore, Hybrid Exploit Detection Network (AHEDNet)" dynamic ensemble adaptation issue where is very high with low false positives. experimental results show outperforms other models dataset 1 0.988086 0.990469, precision 0.987976 0.990628, recall 0.988298 0.990435, lowest Hamming Loss 0.011914 0.009531, also, 2 0.9819 0.9919, 0.9868 0.9968, 0.9813 0.9923, 0.0209 0.0109, thus outperformed detecting exploits.

Язык: Английский

Процитировано

2

AI in Healthcare Safeguarding Patient Privacy and Confidentiality DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 369 - 404

Опубликована: Фев. 14, 2025

In the era of digitization, Artificial Intelligence (AI) integration in healthcare has become a necessity to ensure patient identification & privacy. With rise digitalisation health systems, it also increasingly important have more stringent data protection requirements. This transformation is heavily facilitated by AI-driven technologies that reinforce security, identify real-time threats and streamline compliance with regulations. By utilizing Machine Learning (ML) algorithms comb through big data, outliers can be pinpointed filtered out so unauthorized access prevented assistance advanced forms encryption which protect information while transit or at rest. But fast pace AI development creates as many opportunities challenges, especially when comes marrying availability These ethical concerns, for effective regulatory frameworks, are critical an evolving ecosystem technologies.

Язык: Английский

Процитировано

0

Progress and Obstacles in Cloud Computing for Healthcare DOI

Abu Jor Al Gefari,

Imran Hasan,

Md Amin Ullah Sheikh

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 347 - 368

Опубликована: Фев. 14, 2025

Since the invention of Internet Things (IoT), people are seeing a new world in healthcare. The rapid growth IoT has brought with it solutions to dilemmas and few challenges cloud devices. But keeping mind benefits these devices, need be solved efficiency security. Putting place storage analysis for specific periods is very popular medicine. On other hand, creating big data, considering sensitivity, some limitations have accepted. use latency, throughput, bandwidth increases cost Internet. Numerous alternative paradigms, most notably edge computing fog computing, evolved solve shortcomings. Consequently, studies shown an increase hybrid based.

Язык: Английский

Процитировано

0

Future Trends in AI Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 229 - 262

Опубликована: Фев. 14, 2025

Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.

Язык: Английский

Процитировано

0

Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 1 - 40

Опубликована: Фев. 14, 2025

The technology is becoming a little more widely known with its data security and hyper-transaction reliability. By very design of decentralization implementation cryptographic principles to maintain integrity, blockchain eliminates central points failure making tampering unauthorized changes virtually impossible as well. This part the diary will discuss how giving our financial transactions, providing safety identities agreements seamless smart contracts. From healthcare supply chain management, it amazing witness many industries are beginning incorporate decree validity information, prevent fraud. But you know what they say — new tech has ways break. ride been accompanied by scalability challenges, energy consumption worries, regulation problems so on. There also some promising prospects, quantum-resistant algorithms enhanced interoperability may resolve these widen blockchain's influence.

Язык: Английский

Процитировано

0

Cybersecurity in IoT Ecosystems Managing Device Vulnerabilities and Data Exposure DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 63 - 98

Опубликована: Фев. 14, 2025

The proliferation of IoT devices and sensors leads to greater efficiency but also greatly increased attack surfaces. In this part the series, we delve into some key security issues that plague ecosystems with a solution- understanding device vulnerabilities how they led data exposure. are frequently built without strong defences in place, lack secure firmware combined weak authentication making them top list for attackers. We will turn real-world threats, such as distributed denial service (DDoS) attacks launched by botnets breaches disclose personal information or sensitive business information. Although chapter certainly warns risks, it is no means doom-and-gloom line reasoning. paper outlines best practices systems, from security-by-design principles leveraging AI blockchain technologies.

Язык: Английский

Процитировано

0

Current Security Issues and Vulnerabilities Associated With Mobile Application DOI

Abdullahi Adewole Zakariyah,

Muhammand Intizar Ali,

Nima Yoezer

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 41 - 62

Опубликована: Фев. 14, 2025

Mobile applications have become a crucial part of modern life, facilitating everything from social interactions to financial transactions. However, this ubiquity also presents significant security challenge. The landscape mobile app is fraught with vulnerabilities and threats that can compromise user data, privacy, the overall integrity applications. This paper delves into issues affect It provides an in-depth analysis various attack methods used by cybercriminals extract data explores how users protect their information being compromised. discussion will cover common tactics employed attackers, potential consequences losing application these threats, critical measures necessary for safeguarding against such attacks.

Язык: Английский

Процитировано

0

Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure DOI Open Access

Azheen Waheed,

Bhavish Seegolam,

Mohammad Faizaan Jowaheer

и другие.

Опубликована: Июль 29, 2024

Zero-day threats are a more severe and constantly developing menace to various participants including large companies, government offices, educational establishments. These entities may contain valuable information essential operations that attract cyber attackers. exploits especially devastating as they target weaknesses an organization’s vendors not even aware of, making them have no protection against them. This paper focuses on the background use of zero-day exploitation structure technologies these complex malware attacks. We examine two notable real-life cases: case ‘HAFNIUM targeting Exchange Servers with exploits’ was investigated by Microsoft 365 Security Threat Intelligence, ‘Log4j vulnerability’ reported National Cyber Centre. cases show critical effects vulnerabilities measures taken combat Additionally, this outlines different strategies can be used prevent attacks help modern technologies. fast patch release, effective IDS/IPS, security model involves constant vigilance behavioral analytics. Thus, studying lifecycle exploits, one enhance organization invisible traditional systems. extensive survey is designed useful in understanding characteristics vulnerabilities, for their mitigation, threat development field cybersecurity. it possible strengthen develop time analyzing previous events predicting potential problems.

Язык: Английский

Процитировано

2