Assessment of existing cyber-attack detection models for web-based systems

نویسندگان

چکیده

In the current technological environment, different entities engage in intricate cyber security approaches order to counter damages and disruptions web-based systems. The design of protocols relies on guarantee that attacks are prevented Prevention detection using techniques such as access control tools, encryption firewalls present limitations full protection Furthermore, despite sophistication systems, there still shortfalls high false positive negative threat rates, which is attributed poor adaptation by systems networks changing threats behavior cyber-criminals. this perspective, survey paper discusses existing cyber-attack models, recommends models appropriate for It evident deep learning offer better performance robustness compared traditional machine other non-artificial intelligence-based techniques. Deep learn extract features automatically without human intervention can also handle big multidimensional data more conventionally than

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems

In this short paper, we present an integrated approach to detecting and mitigating cyber-attacks to modern interconnected industrial control systems. One of the primary goals of this approach is that it is costeffective, and thus whenever possible it builds on open-source security technologies and open standards, which are complemented with novel security solutions that address the specific cha...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Adaptive, Model-Based Monitoring for Cyber Attack Detection

Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack specificity, but may not be able to generalize. The latter detect attacks probabilistically, allowing for generalization potential. However, they lack attack models and can potentially “learn” to consider an attack no...

متن کامل

Using Bayesian Attack Detection Models to Drive Cyber Deception

We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Global Journal of Engineering and Technology Advances

سال: 2023

ISSN: ['2582-5003']

DOI: https://doi.org/10.30574/gjeta.2023.15.1.0075