sis 23(6):

Research Article

Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits

Download81 downloads
  • @ARTICLE{10.4108/eetsis.6111,
        author={Nachaat Mohamed and Hamed Taherdoost and Mitra Madanchian},
        title={Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={11},
        number={6},
        publisher={EAI},
        journal_a={SIS},
        year={2024},
        month={6},
        keywords={Zero-Day Exploits, Threat Detection, Adaptive Algorithms, Cybersecurity, Deep Learning in Security, Machine Learning},
        doi={10.4108/eetsis.6111}
    }
    
  • Nachaat Mohamed
    Hamed Taherdoost
    Mitra Madanchian
    Year: 2024
    Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits
    SIS
    EAI
    DOI: 10.4108/eetsis.6111
Nachaat Mohamed1,*, Hamed Taherdoost2, Mitra Madanchian2
  • 1: Rabdan Academy
  • 2: University Canada West
*Contact email: eng.cne9@gmail.com

Abstract

This paper provides an in-depth examination of the latest machine learning (ML) methodologies applied to the detection and mitigation of zero-day exploits, which represent a critical vulnerability in cybersecurity. We discuss the evolution of machine learning techniques from basic statistical models to sophisticated deep learning frameworks and evaluate their effectiveness in identifying and addressing zero-day threats. The integration of ML with other cybersecurity mechanisms to develop adaptive, robust defense systems is also explored, alongside challenges such as data scarcity, false positives, and the constant arms race against cyber attackers. Special attention is given to innovative strategies that enhance real-time response and prediction capabilities. This review aims to synthesize current trends and anticipate future developments in machine learning technologies to better equip researchers, cybersecurity professionals, and policymakers in their ongoing battle against zero-day exploits.