{"title":"Vulnerability Management using Machine Learning Techniques","authors":"T. Shivani, Hegde Ramakrishna, Nagraj Nagashree","doi":"10.1109/ICMNWC52512.2021.9688490","DOIUrl":null,"url":null,"abstract":"This paper presents some technologies and methods for Machine learning. It then highlights security concerns, attack vectors, and logical vulnerabilities. To address these security concerns and shortcomings, we present an areas way to deal with intelligent weaknesses. Programming vulnerability are an essential worry in the IT security industry, as malicious programmers who find these vulnerabilities can regularly miss use them for revolting purposes. Web applications will continue to be presented to events that fail to capitalize on their drawbacks until the end of time. In this research, we examine how AI methods may be used to improve the visibility of Web Application Firewalls (WAFs) that are structures used to identify and prevent assaults. We provide the Cybersecurity Vulnerability Ontology (CVO), a decided model for formal data depiction of the board region's weakness, and we use it to construct a Cyber Intelligence Alert (CIA) structure that sends out advanced alerts concerning faults and security measures. There thoroughly assessed the CVO just as the exactness, execution, and helpfulness of the CIA framework.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMNWC52512.2021.9688490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents some technologies and methods for Machine learning. It then highlights security concerns, attack vectors, and logical vulnerabilities. To address these security concerns and shortcomings, we present an areas way to deal with intelligent weaknesses. Programming vulnerability are an essential worry in the IT security industry, as malicious programmers who find these vulnerabilities can regularly miss use them for revolting purposes. Web applications will continue to be presented to events that fail to capitalize on their drawbacks until the end of time. In this research, we examine how AI methods may be used to improve the visibility of Web Application Firewalls (WAFs) that are structures used to identify and prevent assaults. We provide the Cybersecurity Vulnerability Ontology (CVO), a decided model for formal data depiction of the board region's weakness, and we use it to construct a Cyber Intelligence Alert (CIA) structure that sends out advanced alerts concerning faults and security measures. There thoroughly assessed the CVO just as the exactness, execution, and helpfulness of the CIA framework.