Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security

Main Article Content

Raheela zaib
Kai-Qing Zhou

Abstract

Today's digital ecosystem is particularly vulnerable to attacks due to zero-day vulnerabilities. Attackers take advantage of these flaws, which software developers and security experts are unaware of, leading to catastrophic outcomes. Through an analysis of their lifetime, discovery approaches, exploitation methods, disclosure protocols, and patching strategies, this study tries to reveal the danger landscape of zero-day vulnerabilities. We examine the effects of zero-day vulnerabilities on network security and the difficulties that businesses confront by reviewing the relevant literature and discussing actual cases. We also investigate preventative measures and methods of defense, such as intrusion and anomaly detection systems and cutting-edge AI. We stress the need for responsible disclosure, prompt patching, and continued research to counter these difficult to detect dangers. In order to better understand zero-day vulnerabilities, implement countermeasures, and respond to them, this article is an invaluable resource for researchers, security experts, and organizations.

Downloads

Download data is not yet available.

Article Details

How to Cite
zaib, R., & Zhou, K.-Q. (2022). Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security . Mesopotamian Journal of CyberSecurity, 2022, 57–64. https://doi.org/10.58496/MJCS/2022/007
Section
Articles

References

U. K. Singh, C. Joshi, and D. Kanellopoulos, "A framework for zero-day vulnerabilities detection and prioritization," Journal of Information Security and Applications, vol. 46, pp. 164-172, 2019.

L. Ablon and A. Bogart, Zero days, thousands of nights: The life and times of zero-day vulnerabilities and their exploits. Rand Corporation, 2017.

S. H. Abdullah and A. H. Ali, "Radio Frequency Radiation Power Density measurements at Mobile Base Stations in Alam City," Eurasian Journal of Engineering and Technology, vol. 11, pp. 157-166, 2022.

Y. Roumani, "Patching zero-day vulnerabilities: an empirical analysis," Journal of Cybersecurity, vol. 7, no. 1, p. tyab023, 2021.

A. H. Ali and M. Z. Abdullah, "A novel approach for big data classification based on hybrid parallel dimensionality reduction using spark cluster," Computer Science, vol. 20, no. 4, 2019.

M. Albanese, S. Jajodia, A. Singhal, and L. Wang, "An efficient approach to assessing the risk of zero-day vulnerabilities," in 2013 International Conference on Security and Cryptography (SECRYPT), 2013, pp. 1-12: IEEE.

Z. A. Mohammed, M. N. Abdullah, and I. H. Al Hussaini, "Predicting incident duration based on machine learning methods," Iraqi Journal of Computers, Communications, Control and Systems Engineering, vol. 21, no. 1, pp. 1-15, 2021.

O. N. Al-Khayat, S. Y. Ameen, and M. N. Abdallah, "WSNs power consumption reduction using clustering and multiple access techniques," International Journal of Computer Applications, vol. 87, no. 9, pp. 33-39, 2014.

S. A. Abed, A. H. Ali, O. A. Mohamad, and M. Aljanabi, "Reliability allocation and optimisation by using Kuhn-Tucker and geometric programming for series-parallel system," International Journal of Computer Aided Engineering and Technology, vol. 16, no. 4, pp. 488-496, 2022.

S. A. Abed, M. S. Fiadh, and A. H. Ali, "Reliability Allocation and Optimization Problem for Waste Treatment Plant (WTP)," Eurasian Research Bulletin, vol. 5, pp. 6-13, 2022.

M. N. Abdullah and K. E. Dagher, "Airborne Computer System Path-Tracking Based Multi-PID-PSO Controller Design," International Journal of Intelligent Engineering and Systems, vol. 14, no. 3, pp. 403-411, 2021.

M. G. Yaseen, M. Aljanabi, A. H. Ali, and S. A. Abd, "Current cutting-edge research in computer science," Mesopotamian Journal of Computer Science, vol. 2022, pp. 1-4, 2022.

Z. E. Kanoon, A. S. Al-Araji, and M. N. Abdullah, "Enhancement of Cell Decomposition Path-Planning Algorithm for Autonomous Mobile Robot Based on an Intelligent Hybrid Optimization Method," International Journal of Intelligent Engineering & Systems, vol. 15, no. 3, 2022.

M. N. Abdulla, I. Al-Mejibli, and S. K. Ahmed, "An investigation study of hospital management information system," IJARCCE, vol. 6, pp. 406-411, 2017.

A. S. Dawood and M. N. Abdullah, "Adaptive performance evaluation for SDN based on the statistical and evolutionary algorithms," Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE), vol. 19, 2019.

F. H. Faris, A. T. Humod, and M. N. Abdullah, "A comparative study of PI and IP controllers for field oriented control of three phase induction motor," Iraqi J. Comput. Commun. Control Syst. Eng, 2019.

A. H. Ali, H. Kumar, and P. J. Soh, "Big Data Sentiment Analysis of Twitter Data," Mesopotamian Journal of Big Data, vol. 2021, pp. 1-5, 2021.

Z. H. Salih, G. T. Hasan, M. A. Mohammed, M. A. S. Klib, A. H. Ali, and R. A. Ibrahim, "Study the effect of integrating the solar energy source on stability of electrical distribution system," in 2019 22nd International Conference on Control Systems and Computer Science (CSCS), 2019, pp. 443-447: IEEE.

A.-H. A. Salih, A. H. Ali, and N. Y. Hashim, "Jaya: an evolutionary optimization technique for obtaining the optimal Dthr value of evolving clustering method (ECM)," International Journal of Engineering Research and Technology, vol. 11, no. 12, pp. 1901-1912, 2018.

A. H. Ali and M. Z. Abdullah, "Recent trends in distributed online stream processing platform for big data: Survey," in 2018 1st Annual International Conference on Information and Sciences (AiCIS), 2018, pp. 140-145: IEEE.

P. H. Barros, E. T. Chagas, L. B. Oliveira, F. Queiroz, and H. S. Ramos, "Malware‐SMELL: A zero‐shot learning strategy for detecting zero‐day vulnerabilities," Computers & Security, vol. 120, p. 102785, 2022.

M. Fidler, "Regulating the Zero-Day vulnerability trade: A preliminary analysis," ISJLP, vol. 11, p. 405, 2015.

R. Kaur and M. Singh, "A survey on zero-day polymorphic worm detection techniques," IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1520-1549, 2014.