scispace - formally typeset
Open AccessJournal ArticleDOI

Zero day exploits and national readiness for cyber-warfare

Ayei E. Ibor
- 15 Jan 2018 - 
- Vol. 36, Iss: 4, pp 1174-1183
TLDR
The implications of zero day exploits are discussed and the dangers posed by this cankerworm for an unprepared nation are highlighted and the defence-in-depth strategy for national readiness and a foolproof system that enforces the security of critical national infrastructure at all levels is adopted.
Abstract
A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly reported or announced. But how should a nation react to a zero day? This question is a concern for most national governments, and one that requires a systematic approach for its resolution. The securities of critical infrastructure of nations and states have been severally violated by cybercriminals. Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase. Most of these violations are possible through detectable operational bypasses, which are rather ignored by security administrators. One common instance of a detectable operational bypass is the non-application of periodic security updates and upgrades from software and hardware vendors. Every software is not necessarily in its final state, and the application of periodic updates allow for the patching of vulnerable systems, making them to be secure enough to withstand an exploit. To have control over the security of critical national assets, a nation must be “cyber-ready” through the proper management of vulnerabilities and the deployment of the rightful technology in the cyberspace for hunting, detecting and preventing cyber-attacks and espionage. To this effect, this paper discusses the implications of zero day exploits and highlights the dangers posed by this cankerworm for an unprepared nation. The paper also adopts the defence-in-depth strategy for national readiness and a foolproof system that enforces the security of critical national infrastructure at all levels. Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare

read more

Content maybe subject to copyright    Report

Citations
More filters
ReportDOI

National Strategy to Secure Cyberspace

TL;DR: The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency and program goals with external clients including IT industry, critical infrastructure sectors, and academics.
Book ChapterDOI

Defence in depth

TL;DR: In this paper, the authors describe the Defense in Depth (DID) concept in nuclear safety, which is based on four principal barriers against the external release of radioactive products and five defence levels for using the barriers in a unique way.
Journal ArticleDOI

Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems' Communication Networks based on Bio-inspired Deep Neural Network Structure

TL;DR: In this article , the authors proposed a hybrid approach for intrusion prediction on CPSs communication networks, which uses a bio-inspired hyperparameter search technique to generate an improved deep neural network structure based on the core hyperparameters of a neural network.
References
More filters
Journal ArticleDOI

Stuxnet and the Future of Cyber War

James P. Farwell, +1 more
- 28 Jan 2011 - 
TL;DR: In this article, the authors discuss the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect, and suggest that cyber offers great potential for striking at enemies with less risk than using traditional military means, but careful strategic thought is required in comparing the cost and benefits of cyber versus traditional military attack.
Proceedings ArticleDOI

Distributed denial of service attacks

TL;DR: It is found that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Proceedings ArticleDOI

Before we knew it: an empirical study of zero-day attacks in the real world

TL;DR: This paper describes a method for automatically identifying zero-day attacks from field-gathered data that records when benign and malicious binaries are downloaded on 11 million real hosts around the world and identifies 18 vulnerabilities exploited before disclosure.
Proceedings ArticleDOI

Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience

TL;DR: Hamsa is proposed, a network-based automated signature generation system for polymorphic worms which is fast, noise-tolerant and attack-resilient, and significantly outperforms Polygraph in terms of efficiency, accuracy, and attack resilience.
Proceedings ArticleDOI

Validating and Restoring Defense in Depth Using Attack Graphs

TL;DR: A tool named NetSPA is presented that analyzes firewall rules and vulnerabilities to construct attack graphs that show how inside and outside attackers can progress by successively compromising exposed vulnerable hosts with the goal of reaching critical internal targets.
Trending Questions (1)
Why is hacking a cyber threat? Emphasize on brute force attacks and zero day exploits?

Hacking is a cyber threat because it can lead to unauthorized access, data breaches, and disruption of critical systems. Brute force attacks and zero day exploits are common methods used by hackers to gain access to systems.