Neural Networks for Vulnerability Scanning in Automobiles Ethernet Connections

A. Raizada, Manbir Kaur Brar
{"title":"Neural Networks for Vulnerability Scanning in Automobiles Ethernet Connections","authors":"A. Raizada, Manbir Kaur Brar","doi":"10.1109/IC3I56241.2022.10073107","DOIUrl":null,"url":null,"abstract":"A need for enhancing our everyday lives is the widespread use of interconnected and interoperable computer systems. The same is true for exploitable defects that are uncontrollable by humans. Computer security methods are necessary to handle contact because of the weaknesses. Reliable connection requires security standards and advancements in protection measures to counter escalating security issues. This paper offers building an adaptive and durable intrusion detection system utilizing deep learning systems to recognize and categorise cyber-attacks. The emphasis is on how learning or deep neuronal systems (DCNNs) may aid adaptive IDS with developing capabilities discern between known and new or negligible networking detectable qualities, disconnecting the intrusive party and reducing the danger of exposure. The effectiveness of the model was shown using the UNSW-NB15 database, whose represents real current network activity in addition to artificially constructed attack behavior.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10073107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A need for enhancing our everyday lives is the widespread use of interconnected and interoperable computer systems. The same is true for exploitable defects that are uncontrollable by humans. Computer security methods are necessary to handle contact because of the weaknesses. Reliable connection requires security standards and advancements in protection measures to counter escalating security issues. This paper offers building an adaptive and durable intrusion detection system utilizing deep learning systems to recognize and categorise cyber-attacks. The emphasis is on how learning or deep neuronal systems (DCNNs) may aid adaptive IDS with developing capabilities discern between known and new or negligible networking detectable qualities, disconnecting the intrusive party and reducing the danger of exposure. The effectiveness of the model was shown using the UNSW-NB15 database, whose represents real current network activity in addition to artificially constructed attack behavior.
基于神经网络的汽车以太网连接漏洞扫描
广泛使用互联互通的计算机系统是提高我们日常生活质量的需要。对于人类无法控制的可利用缺陷也是如此。计算机安全处理方法是必要的,因为接触的弱点。可靠的连接需要安全标准和先进的保护措施,以应对不断升级的安全问题。本文提出了一种利用深度学习系统来识别和分类网络攻击的自适应和持久的入侵检测系统。重点是学习或深度神经系统(DCNNs)如何帮助具有发展能力的自适应IDS区分已知和新的或可忽略的网络可检测特性,断开侵入方的连接并减少暴露的危险。使用UNSW-NB15数据库证明了该模型的有效性,该数据库除了人工构建的攻击行为外,还代表了当前真实的网络活动。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信