Zero-day attacks exploit undisclosed vulnerabilities rather than novel behaviors, so vulnerability-centric detection aligns better with real incidents than behavior-focused ML approaches.
Revisiting Anomaly-based Network Intrusion Detection Systems [PhD Thesis - Research UT, graduation UT]
1 Pith paper cite this work. Polarity classification is still indexing.
1
Pith paper citing it
fields
cs.CR 1years
2026 1verdicts
UNVERDICTED 1representative citing papers
citing papers explorer
-
Zero Day Attacks: Novel Behaviour or Novel Vulnerability?
Zero-day attacks exploit undisclosed vulnerabilities rather than novel behaviors, so vulnerability-centric detection aligns better with real incidents than behavior-focused ML approaches.