Strategy and Knowledge-Based XML Attack Detection Systems using Ontology
Gajanan P Bherde1, M.A.Pund2
1Gajanan P Bherde*, Department of Computer Science & Engineering, PRMIT & R Badnera, Amravati, India.
2Dr. M.A.Pund, Department of Computer Science & Engineering, PRMIT&R Badnera, Amravati, India.
Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 798-801 | Volume-8 Issue-5, January 2020. | Retrieval Number: E5786018520/2020©BEIESP | DOI: 10.35940/ijrte.E5786.018520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Today’s highly skilled attackers exploit many of the vulnerabilities in their network. On the other hand, the risk of data leakage has increased dramatically because software or application vulnerability is always left without a fix. Such vulnerability using the (Zero Day), hackers will receive the target network, and can steal sensitive data. Detection of zero day traditional defenses is difficult, because the signature information zero-day attacks are unknown. Therefore, the need for new security solutions, that detect zero-day attacks, and evaluate the identified zero day vulnerability severity. The paper proposed an approach for detecting unknown vulnerabilities. The system is a framework that is a comprehensive approach for detecting and prioritizing zero-day attacks and removes these detected attacks. The proposed framework is based on probabilistic approach, to determine the Zero-Day attack path, and the subsequent degree of severity of the identified zero-day vulnerability. It is a hybrid of detection and removal method based on the detection of unknown defects present in the network, which is not yet detected. The system also shows the file with original size and with an attacked size.
Keywords: Zero-day attacks, signature information, Vulnerability analysis.
Scope of the Article: Information-Centric Networking.