Previously undiscovered or unknown cyberthreats, known as zero-day attacks, are a serious threat to private organizations, governments, and individuals. The threat these zero-day attacks pose is so great due to the lack of knowledge about the threat and the lack of time to prepare for the threat. Conventional detection and prevention technologies such as signature-based detection and software patching both rely on prior knowledge and time to react to cyberthreats. Machine learning allows for cybersecurity professionals to not be dependent on these constraints. Eliminating the reliance on prior knowledge and response time is a crucial step in detecting, preventing, and combatting zero-day attacks. This work will discuss the threat these zero-day attacks pose to Internet security, explain the benefits of incorporating machine learning techniques into the detection, prevention and combatting of zero-day attacks, and will provide a recommendation of a comprehensive and industry wide defense-in-depth strategy to minimize the potential damage of zero-day attacks.
|Advisor:||Kratochvil, Daniel, Popyack, Leonard|
|School Location:||United States -- New York|
|Source:||MAI 82/7(E), Masters Abstracts International|
|Subjects:||Computer science, Artificial intelligence, Information Technology, Management, Web Studies|
|Keywords:||Cyberattack, Defense-in-depth, Machine learning, Software vulnerabilities, Zero-day cyberattacks, Internet, Cyberthreats, Private organizations|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be