Visible to the public Process trees amp; service chains can serve us to mitigate zero day attacks better

TitleProcess trees amp; service chains can serve us to mitigate zero day attacks better
Publication TypeConference Paper
Year of Publication2017
AuthorsBardia, Vivek, Kumar, C.R.S.
Conference Name2017 International Conference on Data Management, Analytics and Innovation (ICDMAI)
Keywordsapplication frameworks, attack sophistication, buggy software, complete threat canvas, composability, Computer graphics, computer security, cyber domain, cyber security, data protection systems, data visualisation, Data visualization, Data Visualization techniques, exponential evolution, front-end sophistication domain, human computer interaction, human computer interactions, invasive software, learning (artificial intelligence), machine learning, network threats, operating system, operating systems (computers), Predictive Metrics, process trees, pubcrawl, Resiliency, sales team, service chains, Software, software professionals, software quality, software quality metrics, Standards, time 0.0 d, Tools, Unique Selling Proposition, user friendly applications, users, USP, Zero day attacks, Zero Day Attacks and Defense, zero day threats
AbstractWith technology at our fingertips waiting to be exploited, the past decade saw the revolutionizing Human Computer Interactions. The ease with which a user could interact was the Unique Selling Proposition (USP) of a sales team. Human Computer Interactions have many underlying parameters like Data Visualization and Presentation as some to deal with. With the race, on for better and faster presentations, evolved many frameworks to be widely used by all software developers. As the need grew for user friendly applications, more and more software professionals were lured into the front-end sophistication domain. Application frameworks have evolved to such an extent that with just a few clicks and feeding values as per requirements we are able to produce a commercially usable application in a few minutes. These frameworks generate quantum lines of codes in minutes which leaves a contrail of bugs to be discovered in the future. We have also succumbed to the benchmarking in Software Quality Metrics and have made ourselves comfortable with buggy software's to be rectified in future. The exponential evolution in the cyber domain has also attracted attackers equally. Average human awareness and knowledge has also improved in the cyber domain due to the prolonged exposure to technology for over three decades. As the attack sophistication grows and zero day attacks become more popular than ever, the suffering end users only receive remedial measures in spite of the latest Antivirus, Intrusion Detection and Protection Systems installed. We designed a software to display the complete services and applications running in users Operating System in the easiest perceivable manner aided by Computer Graphics and Data Visualization techniques. We further designed a study by empowering the fence sitter users with tools to actively participate in protecting themselves from threats. The designed threats had impressions from the complete threat canvas in some form or other restricted to systems functioning. Network threats and any sort of packet transfer to and from the system in form of threat was kept out of the scope of this experiment. We discovered that end users had a good idea of their working environment which can be used exponentially enhances machine learning for zero day threats and segment the unmarked the vast threat landscape faster for a more reliable output.
DOI10.1109/ICDMAI.2017.8073525
Citation Keybardia_process_2017