A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model
Journal Title: INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML) - Year 2022, Vol 6, Issue 1
Abstract
Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation.Design/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. Findings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyber-assault detection and mitigation system using the BRELU-RESNET method was evaluated in this study.Originality/Value: This review-based research article examines the present state of cyber-attack detection and mitigation, as well as the research gaps and research goals.PaperType: Review-based research analysis
Authors and Affiliations
Sangeetha Prabhu, Nethravathi P. S.
ICT and Digital Technology based Solutions for Smart City Challenges and Opportunities
Purpose: Today's Smart Cities are rapidly evolving with the help of the latest tools and technologies and also due to large investment and priority focus by various countries across the globe. Smart Citie...
Measuring the Level of Preparedness to Face Challenges during Uncertain Times: A FirmLevel Scale for Brick-and-Mortar Retailers in India (FLSPU-b)
A majority of brick-and-mortar (B&M) retailers in India have adapted firm-level and outputdriven measures to evaluate their overall retailing performance. This output-driven measures approach is distracting them from fo...
Performance Analysis of Mobile Ad Hoc Routing Protocols in Vehicular Ad Hoc Networks using NS3
Vehicular Ad hoc Networks (VANET) is an emerging technology that brings tremendous technological advancement in the method of communication among smart vehicles. Due to its complex infrastructure and vehicle speed, dat...
Compliance Status of Building Bylaws and Codes in High-rise Apartment Buildings of Nepal
Purpose: The implementation and compliance of building bylaws and building codes in apartment buildings in Nepal are always questionable. Thus, the overall objective of the study was to assess the building bylaws and b...
Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions
Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become v...