Research Article
Implementation and Design of a Zero-Day Intrusion Detection and Response System for Responding to Network Security Blind Spots
Table 1
Classification of related work on zero-day attacks.
| Category | Reference |
| Provenance tracking method | [10] | Detection architecture of a software-defined network | [11] | Signature-based detection method | [12, 13] | Machine learning-based detection method | [14–16] | Anomaly detection method | [14–20] | Specification-based detection method | [21–23] |
|
|