Cybersecurity is the domain that ensures safeness in both individual system and overall network systems. The classification and learning approaches used in different machine learning (ML) techniques improve the protection of the cyber systems against various attacks. Techniques such as support vector machine (SVM), neural networks (NN), principle component analysis (PCA), and reinforcement learning (RL) are used against various cyber threats. Applying these techniques at the front-end services (either online or offline) makes less effect than back end process-level services of any computer system. The proposed work analyzes the benefits of implementing customized ML and deep learning (DL) techniques on the core of the operating system than application level services, which in effect increases the speed and correctness of attack detection. The core (kernel) of the operating system has the capability to extract all internal attributes of process and file systems. The kernel space security activities can be improved by proposed work where the process level attributes classified using ML and DL techniques. The cloud service helps in sharing of the kernel abilities of the system ensuring core level security. The following work uses recurrent NN (RNN), SVM, PCA, and RL for analyzing the system data collected using Process Explorer. This technique finds application in manufacturing domain where the systems are protected from the various attacks to secure the data of the manufacturing company.
Mobile Ad hoc Network or MANET is a wireless network that allows communication between the nodes that are in range of each other and are self-configuring. The distributed administration and dynamic nature of MANET makes it vulnerable to many kind of security attacks. One such attack is Black hole attack which is a well known security threat. A node drops all packets which it should forward, by claiming that it has the shortest path to the destination. Intrusion Detection system identifies the unauthorized users in the system. An IDS collects and analyses audit data to detect unauthorized users of computer systems. This paper aims in identifying Black-Hole attack against AODV with Intrusion Detection System, to analyze the attack and find its countermeasure.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.