IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v19y2025i1p1-21.html
   My bibliography  Save this article

An Ontology-Based Approach for Zero-Day Information Security Threat Management

Author

Listed:
  • John Kennedy Otieno Odego

    (Jomo Kenyatta University of Agriculture and Technology, Kenya)

  • Kennedy Odhiambo Ogada

    (Jomo Kenyatta University of Agriculture and Technology, Kenya)

  • Dennis Mugambi Kaburu

    (Jomo Kenyatta University of Agriculture and Technology, Kenya)

Abstract

Zero Day security threats are diverse and manifest in many forms. Despite the growing number of zero day attacks, very little information about the kind of threat and how to defend against the threats is known by information security professionals. Signature based techniques and statistical based techniques have been seen to be less effective in handling Zero-day security threats (ZDST) since they require a new threat signature and threat profile to be learnt each time, meaning new signatures and profiles cannot be detected and behavior-based approaches have always resulted in many false positives in handling of zero-day security threats. The ZDST may result in disruptions of service, loss of data, loss of data integrity, corruption of data, systems malfunction, miscommunication, or other undesired effects on information systems. This research proposes an ontology-based approach for management of ZDST and evaluates its performance for use in detection and prevention of ZDST within the information security domain.

Suggested Citation

  • John Kennedy Otieno Odego & Kennedy Odhiambo Ogada & Dennis Mugambi Kaburu, 2025. "An Ontology-Based Approach for Zero-Day Information Security Threat Management," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 19(1), pages 1-21, January.
  • Handle: RePEc:igg:jisp00:v:19:y:2025:i:1:p:1-21
    as

    Download full text from publisher

    File URL: https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.384606
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:19:y:2025:i:1:p:1-21. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.