Research Article

Implementation and Design of a Zero-Day Intrusion Detection and Response System for Responding to Network Security Blind Spots

Table 1

Classification of related work on zero-day attacks.

CategoryReference

Provenance tracking method[10]
Detection architecture of a software-defined network[11]
Signature-based detection method[12, 13]
Machine learning-based detection method[1416]
Anomaly detection method[1420]
Specification-based detection method[2123]