A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model

S. Prabhu, Nethravathi P. S.
{"title":"A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model","authors":"S. Prabhu, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0126","DOIUrl":null,"url":null,"abstract":"Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation.\nDesign/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. \nFindings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyber-assault detection and mitigation system using the BRELU-RESNET method was evaluated in this study.\nOriginality/Value: This review-based research article examines the present state of cyber-attack detection and mitigation, as well as the research gaps and research goals.\nPaper Type: Review-based research analysis","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Engineering and Management Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47992/ijaeml.2581.7000.0126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation. Design/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. Findings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyber-assault detection and mitigation system using the BRELU-RESNET method was evaluated in this study. Originality/Value: This review-based research article examines the present state of cyber-attack detection and mitigation, as well as the research gaps and research goals. Paper Type: Review-based research analysis
基于深度集成模型的网络攻击检测与缓解概念模型综述
目的:当通信网络和物联网被集成到业务控制系统中时,它们更容易受到网络攻击,这可能会造成灾难性的后果。入侵检测系统对于识别和阻止物联网网络中的攻击至关重要。因此,本文利用一种独特的分类和加密方法,为攻击节点缓解提供了一种新的体系结构。设计/方法/途径:本研究回顾了各种网络攻击检测模型及其缓解技术的现状。该模型的工作原理使系统首先在数据集上进行训练,包括DDoS攻击和勒索软件组件。该模型检查它是否包含来自DDoS或勒索软件的恶意软件。在测试时,我们使用经过训练的信息或数据集来提供攻击存在的结果,以及我们提供的输入的提取特征的攻击类型。当模型识别出攻击节点后,通过诱饵技术将其从网络中移除。调查结果/结果:认识到资讯安全的重要性,对打击网络犯罪和鼓励网络安全至关重要。目前有许多战术、策略和设备用于检测计算机网络中的入侵,并且正在进行持续的研究以提高检测入侵的能力。本研究对使用BRELU-RESNET方法的网络攻击检测和缓解系统的基本版本进行了评估。原创性/价值:这篇基于评论的研究文章考察了网络攻击检测和缓解的现状,以及研究差距和研究目标。论文类型:基于综述的研究分析
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信