Assessment of existing cyber-attack detection models for web-based systems
نویسندگان
چکیده
In the current technological environment, different entities engage in intricate cyber security approaches order to counter damages and disruptions web-based systems. The design of protocols relies on guarantee that attacks are prevented Prevention detection using techniques such as access control tools, encryption firewalls present limitations full protection Furthermore, despite sophistication systems, there still shortfalls high false positive negative threat rates, which is attributed poor adaptation by systems networks changing threats behavior cyber-criminals. this perspective, survey paper discusses existing cyber-attack models, recommends models appropriate for It evident deep learning offer better performance robustness compared traditional machine other non-artificial intelligence-based techniques. Deep learn extract features automatically without human intervention can also handle big multidimensional data more conventionally than
منابع مشابه
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملPRECYSE: Cyber-attack Detection and Response for Industrial Control Systems
In this short paper, we present an integrated approach to detecting and mitigating cyber-attacks to modern interconnected industrial control systems. One of the primary goals of this approach is that it is costeffective, and thus whenever possible it builds on open-source security technologies and open standards, which are complemented with novel security solutions that address the specific cha...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملAdaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack specificity, but may not be able to generalize. The latter detect attacks probabilistically, allowing for generalization potential. However, they lack attack models and can potentially “learn” to consider an attack no...
متن کاملUsing Bayesian Attack Detection Models to Drive Cyber Deception
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Global Journal of Engineering and Technology Advances
سال: 2023
ISSN: ['2582-5003']
DOI: https://doi.org/10.30574/gjeta.2023.15.1.0075