Regresar a Artículos Indexados
  • LATIN-AMERICAN JOURNAL OF COMPUTING//(VOL. 8, NUM. 1)

    Volumen: 8, Numero: 1, Páginas: 38-53 pp.

    ZERO-DAY ATTACK: DEPLOYMENT AND EVOLUTION

    Abstract

    In cybersecurity and computer science, the term ?zero-day? is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a high risk probability, and a critical impact. Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate X. Riofrio, F. Astudillo-Salinas, L.Tello-Oquendo and J. Merchan-Lima, ? Zero-day attack: Deployment and evolution?, Latin-American Journal of Computing (LAJC), vol. 8, no. 1, 2021. them. In this paper, it is conducted a review of the zero-day attack, how to understand its real impact, and a few different accessible solutions nowadays. This study introduces a useful reference that provides researchers with knowledge to understand the current problem concerning zero-days attacks; hence they could develop solutions for facing them.


    Keywords


    Zero-day, vulnerability, attack, impact, deploy- ment.


    Resumen

    En la ciberseguridad y lainformática, el término "Zero-day" se relacionacomúnmente con problemas, amenazas ypeligros, esto debido a la falta de conocimiento,experiencia o malentendidos relacionados. Unataque de Zero-day se considera generalmenteuna nueva vulnerabilidad sin defensa; por lotanto, el ataque consecuente tendrá una altaprobabilidad de riesgo, y un impacto crítico.Lamentablemente, sólo unos pocos estudiosestán disponibles para comprender estasamenazas, y no bastan para construir nuevassoluciones para detectar, prevenir y mitigarestas dificultades. En este artículo, se presentauna revisión del ataque Zero-day, enfocándoseen comprender su impacto real y algunassoluciones accesibles hoy en día. Este estudiopresenta una referencia útil que proporcionaa los investigadores conocimientos paracomprender el problema actual relacionadocon los ataques Zero-day. Este puede ser unpunto de partida para desarrollar solucionespara combatir este problema.


    Palabras Clave


    Zero-day, vulnerabilidad, ataque, impacto, implementación.





    Acceder