New Solutions For Zero-Day Attacks

A zero day threat is a vulnerability that developers and security researchers have known about for less than a day. In many cases, these threats are first identified by penetration testers and white hats, which gives them time to issue emergency patches.

They are usually enabled by unknown vulnerabilities and defending against zero-day attacks is one of the most fundamentally challenging security problems yet to be solved. 

Zero-day attacks continue to challenge even the strongest network security defenses. A zero-day attack path is formed when a multi- step attack contains one or more zero-day exploits. Detecting zero-day attack paths in time could enable early disclosure of zero-day threats. 

These attacks can take over a computer systems security and it can take weeks to get the systems working again. 
For instance, the WannaCry ransomware attack, which occurred in May 2017, targeted more than 200,000 Windows computers across 150 countries and caused an estimated $4 billion to $8 billion worth of damage. This adaptive machine learning-driven method was developed to address current limitations in a method to detect and respond to cyber-attacks, called moving target defense, or MTD.

Now, researchers at Penn State University have used reinforcement learning, to create an adaptive cyber defense against zero-day attacks.The team’s approach relies on reinforcement learning, which, along with supervised and unsupervised learning, is one of the three main machine learning paradigms. 

According to the researchers, reinforcement learning is a way that a decision-maker can learn to make the right choices by selecting actions that can maximise rewards by balancing exploitation, leveraging past experiences, and exploration, trying new actions. “The decision-maker learns optimal policies or actions through continuous interactions with an underlying environment, which is partially unknown,” said Peng Liu, MD Professor of Cybersecurity in the College of Information Sciences and Technology. “So, reinforcement learning is particularly well-suited to defend against zero-day attacks when critical information, the targets of the attacks and the locations of the vulnerabilities, is not available.”

Zero-day cyber attacks are among the most dangerous threats to computer systems and can cause serious and lasting damage. Due to the information asymmetry between attackers and defenders, detecting zero-day attacks remains a major challenge. Their use in cyber attacks is still at an early phase and hackers can be expected to adapt and become smarter and more effective  

TechXplore:       Research Gate:       Faronics:     NIST:        NIST:     I-HLS:    Image: Unsplash

You Might Also Read: 

Artificial Intelligence Is The Future Of Security:

 

« Social Media’s Troublesome Influence On Politics
Microsoft Releases Free Tool For Hunting SolarWinds Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.