Abstract
All systems with software code are susceptible to an attack called “zero day”, which exploits vulnerabilities that are not yet disclosed or known to the public or vendor. Organizations around the world are often left unprotected against these attacks. Cyber criminals follow zero day vulnerabilities closely to commit malicious actions. The goal of this paper is to design a framework utilizing the most efficient methods to detect and contain zero day exploits, propose improvements, and compare current anti-malware tools (AMTs). Analyzing the ability of multiple AMTs to detect zero day malware will assist cyber security professionals in selecting the most compatible for their respective environments and defend against these attacks.
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have