A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model
Journal Title: INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML) - Year 2022, Vol 6, Issue 1
Abstract
Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation.Design/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. Findings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyber-assault detection and mitigation system using the BRELU-RESNET method was evaluated in this study.Originality/Value: This review-based research article examines the present state of cyber-attack detection and mitigation, as well as the research gaps and research goals.PaperType: Review-based research analysis
Authors and Affiliations
Sangeetha Prabhu, Nethravathi P. S.
Application of Artificial Intelligence Technology in Tesla-A Case Study
Background/Purpose: Artificial intelligence algorithms are like humans, performing a task repeatedly, each time changing it slightly to maximize the result. A neural network is made up of several deep layers that allow f...
Inset-fed Multiband Square Patch Antenna on Flexible substrate for Fifth-Generation Wireless Communication
Purpose:Over a decade, the antenna has sparked considerable interest in the 5G frequency band in the wireless domain (covering industrial applications, home automation and mobile communication) because of its numerou...
IFE & EFE, TOWS and QPSM Analysis of Online Food Delivery Services
Purpose: This study attempts to analyse internal and external factors that favourably lead to increased turnover of Online Food Delivery Services and to offer best strategies that can be implemented based on those indica...
Demonstration of Drawing by Robotic Arm using RoboDK and C#
Purpose:Robots are transforming the world, and soon they will take part or assist in our all-dailylife activities. There are several fields where robots are already doing well, like Surgery, painting, industrial automa...
Job Safety Analysis during Tunnel Construction
Purpose: There are many tunnels under construction in Nepal as its mountainous country. Road, water supply, hydropower, and irrigation projects are under construction in Nepal through the tunnel. “Safety First” should...