2023
DOI: 10.55529/jaimlnn.32.33.42
|View full text |Cite
|
Sign up to set email alerts
|

An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System

Abstract: An intrusion detection system, often known as IDS, is a piece of equipment or a piece of software that monitors a network or collection of devices in order to search for indications of possible intrusion. The frequency of cyber assaults has grown in recent years, and with it, the damage they do to society. The study of cyber security and the avoidance of cyber assaults, such as the use of intrusion detection as a defensive mechanism, is therefore needed. The internet services are widely used. Services based on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The goal of a DoS attack is not to breach the system' security but rather to hinder its functionality and disrupt normal operations. DoS attacks can be executed using various methods, such as flooding the target with traffic, exploiting vulnerabilities in the system, or consuming its resources excessively [20]. Mitigating and preventing DoS attacks require robust security measures, including traffic filtering, resource management, and the use of specialized intrusion detection and prevention systems.…”
Section: Dosmentioning
confidence: 99%
“…The goal of a DoS attack is not to breach the system' security but rather to hinder its functionality and disrupt normal operations. DoS attacks can be executed using various methods, such as flooding the target with traffic, exploiting vulnerabilities in the system, or consuming its resources excessively [20]. Mitigating and preventing DoS attacks require robust security measures, including traffic filtering, resource management, and the use of specialized intrusion detection and prevention systems.…”
Section: Dosmentioning
confidence: 99%
“…There must be more research into cyber refuge and the prevention of cyber attacks, such as the deployment of intrusion detection as a preventative measure, as indicated by Jain et al [18]. Most people today utilize at least one internet service.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, there has been growing interest in leveraging artificial intelligence (AI) techniques to enhance the detection capabilities of HIDSs by analyzing large volumes of data, identifying patterns, and detecting anomalies that may indicate malicious activities [15] and for system-call-pattern recognition [7]. One approach in the AI direction is the use of autoencoders, a type of neural network, for intrusion detection [16].…”
Section: Introductionmentioning
confidence: 99%