A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model
Journal Title: INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML) - Year 2022, Vol 6, Issue 1
Abstract
Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation.Design/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. Findings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyber-assault detection and mitigation system using the BRELU-RESNET method was evaluated in this study.Originality/Value: This review-based research article examines the present state of cyber-attack detection and mitigation, as well as the research gaps and research goals.PaperType: Review-based research analysis
Authors and Affiliations
Sangeetha Prabhu, Nethravathi P. S.
Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions
Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become v...
Application of Artificial Intelligence Technology in Tesla-A Case Study
Background/Purpose: Artificial intelligence algorithms are like humans, performing a task repeatedly, each time changing it slightly to maximize the result. A neural network is made up of several deep layers that allow f...
Terminal++ for Robot Researcher Using C#
Purpose:Sometimes our robot researcher needs a terminal program to exchange the data with the robot or automation device. Nevertheless, the readily available terminal program lacks some functionality that is mo...
Demonstration of Modbus Protocol for Robot Communication Using C#
Purpose:The Modbus is the trusted name in the industrial automation communication domain. It is a pretty simple protocol to implement and so very popular to the industrial communication personnel. Nowadays, someindustri...
A Study on the Role of Precision Agriculture in Agro-Industry
Purpose: Agriculture is a vast field that necessitates the assistance of disciplines from other fields in order to properly grow. In recent days Information technology is been used in agriculture that helps in the ef...