Author
Listed:
- Nyia Okechukwu C.
(Centre for Cyberspace; Nasarawa State University, Keffi (NSUK), Nigeria)
- Gilbert Aimufua
(Centre for Cyberspace; Nasarawa State University, Keffi (NSUK), Nigeria)
- Julius Adebowale M.
(Department of Computer Science, Baze University Abuja)
- Victor Emmanuel Kulugh
(Department of cybersecurity, Bingham University, Karu)
Abstract
Zero-day exploit has remained one of the main challenges facing network administrators over the years; while several studies have been proposed to help solve this problem, the need for a deception model which is reliable remains a gap. The aim of this study is deception technique for zero–day exploit management. The methodology used is quantitative. The testbed under study is Ethnos cyber limited. The research method are modelling of the network facility, formulation of vulnerability problem, proposed behavioural analytical model using Stochastic Game Theory (SGT) technique, modelling of the decoy facility with honeypot techniques, modelling of the decoy vulnerability with honeypot techniques, then modelling of the new deception technique for zero-day attack management. To implement the new security solution on the testbed, python programming language was applied, while the data used for the coding was collected from the testbed. Simulation was applied for the testing of the new security model using data collected from the testbed. Metrics such as Attack Diversion Rate (ADR), Honeytoken Activation Rate (HAR), Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), and False Positive Rate (FPR), vulnerability conviction rate and exploitability rate were all applied to evaluate the model performance. The ADR reported as 91.56%, MTTD recorded as 5.96s, while the rate of honeypot activation was measured as 87.45%. The exploitability and conviction rate of the honeytoken reported 0.6 and 0.98 respectively. MTTR reported 10.04s, while the false positive rate reported an average of 3.07%.
Suggested Citation
Nyia Okechukwu C. & Gilbert Aimufua & Julius Adebowale M. & Victor Emmanuel Kulugh, 2025.
"Application of Deception Technique for the Management of Zero-Day Exploit,"
International Journal of Research and Innovation in Applied Science, International Journal of Research and Innovation in Applied Science (IJRIAS), vol. 10(8), pages 13-27, August.
Handle:
RePEc:bjf:journl:v:10:y:2025:i:8:p:13-27
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bjf:journl:v:10:y:2025:i:8:p:13-27. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dr. Renu Malsaria (email available below). General contact details of provider: https://rsisinternational.org/journals/ijrias/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.