2023
DOI: 10.30574/gjeta.2023.15.1.0075
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of existing cyber-attack detection models for web-based systems

Abstract: In the current technological environment, different entities engage in intricate cyber security approaches in order to counter damages and disruptions in web-based systems. The design of the security protocols relies on the guarantee that attacks are prevented in the web-based systems. Prevention and detection using techniques such as access control tools, encryption and firewalls present limitations in the full protection of web-based systems. Furthermore, despite the sophistication of current systems, there … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 154 publications
0
5
0
Order By: Relevance
“…Adam optimizer combines the functions of two different optimization techniques namely SGD and RMSprop and outperforms the SGD and RMSprop optimization techniques in terms of accuracy as per [31]. minimal false alarm rates, and affordable computation costs [3]. In this study, results in bold italics were improved performance indicators, those in bold were similar performance indicators, and those in italics were poor performance indicators.…”
Section: Optimizermentioning
confidence: 62%
See 2 more Smart Citations
“…Adam optimizer combines the functions of two different optimization techniques namely SGD and RMSprop and outperforms the SGD and RMSprop optimization techniques in terms of accuracy as per [31]. minimal false alarm rates, and affordable computation costs [3]. In this study, results in bold italics were improved performance indicators, those in bold were similar performance indicators, and those in italics were poor performance indicators.…”
Section: Optimizermentioning
confidence: 62%
“…The phishing website attack success may result in losses in finances, productivity, reputability, credibility, continuity, and damage to national security [2]. Therefore, the development of cyberattack detection systems is essential for the security of sensitive and personal data, data exchanges, and online transactions [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In an era marked by the rapid digitization of information and communication, the omnipresence of cyber threats necessitates an evolution in cybersecurity strategies. Traditional firewalls, once the stalwarts of network defense, are grappling with the intricacies of contemporary threats, prompting the emergence of next-generation firewalls (NGFWs) [5]. At the forefront of this technological evolution is the integration of artificial intelligence (AI), offering a paradigm shift in threat detection, prevention, and response.…”
Section: Introductionmentioning
confidence: 99%
“…NGFWs, by incorporating AI technologies, present a potent solution to address the dynamic and evolving nature of modern cyberattacks. AI's ability to adapt, learn, and analyze patterns in real-time provides a robust defense mechanism against a diverse array of threats, ranging from malware and phishing attacks to advanced persistent threats (APTs) [5]. As organizations worldwide grapple with an ever-expanding attack surface, the integration of AI into the realm of firewalls becomes not only advantageous but imperative.…”
Section: Introductionmentioning
confidence: 99%