International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
.
Follow Us On :
current issues
Volume-12,Issue-2  ( Nov, 2024 )
Statistics report
Jul. 2025
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 22
Paper Published : 201
No. of Authors : 552
  Journal Paper


Paper Title :
Anomaly Detection for Zero-Day Exploit Identification in Network Traffic Using Isolation Forest

Author :Tippireddy Palli Thanusma, Ankam Srinivas, Murari Jayasurya, Sura Ashwini, Shaik Mastan Vali, Thota Anjali Sri, D Santhadevi

Article Citation :Tippireddy Palli Thanusma ,Ankam Srinivas ,Murari Jayasurya ,Sura Ashwini ,Shaik Mastan Vali ,Thota Anjali Sri ,D Santhadevi , (2024 ) " Anomaly Detection for Zero-Day Exploit Identification in Network Traffic Using Isolation Forest " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 27-34, Volume-12,Issue-2

Abstract : Zero-day exploitation embodies a high risk cyber threat as it uses un-patched vulnerabilities long before those flaws can be addressed and such systems remain vulnerable. Attackers with malicious intent target unfixed vulnerabilities making these attacks very prevalent and sometimes deadly since basic virus protections may not be able to prevent them. Therefore, the fact that a zero-day attack occurs is that an there has been some identified vulnerability in an application and there’s time for the vendor to patch it. This has created room for the cyber attackers whose impaction on the organizations could include loss of private data, financial resources, system down times among others. The increasing use of fog and cloud infrastructures has heightened the dangers posted by zero day attacks. Some of the positive attributes of these distributed systems are increased speed and improves performance due to scaling; In increasing the performance, however, they create room for attack. The fastpaced changes in fog and cloud infrastructures also make tracking of threats rather difficult validating the approach for additional layers of security. It is critical to perform these activities as early as possible in order to prevent any severe consequences. In network traffic engaging ML methods due to their capabilities of dealing with high dimensional datasets. Keywords - Zero-Day Exploits, Anomaly Detection, Network Traffic Analysis, Isolation Forest, Machine Learning, Cybersecurity, Anomaly Detection Algorithms, Security Threat Analysis.

Type : Research paper

Published : Volume-12,Issue-2




Copyright: © Institute of Research and Journals

| PDF |
Viewed - 22
| Published on 2025-03-21
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-12,Issue-2(Nov, 2024)
The Conference World

JOURNAL SUPPORTED BY


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 1683

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 1683