Enhancing Cyber Security through Predictive Analytics: Real-Time Threat Detection and Response

M Danish - arXiv preprint arXiv:2407.10864, 2024 - arxiv.org
This research paper aims to examine the applicability of predictive analytics to improve the
real-time identification and response to cyber-attacks. Today, threats in cyberspace have …

SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware

X Liu, Y Huang, T Wang, S Li, W Niu, J Shen… - Proceedings of the …, 2024 - dl.acm.org
SQL injection is a significant and persistent threat to web services. Most existing protections
against SQL injections rely on traffic-level anomaly detection, which often results in high …

[HTML][HTML] Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation

P Schummer, A del Rio, J Serrano, D Jimenez… - AI, 2024 - mdpi.com
Background: In the last decade, numerous methods have been proposed to define and
detect outliers, particularly in complex environments like networks, where anomalies …

A novel hybrid neural network approach incorporating convolution and LSTM with a self-attention mechanism for web attack detection

K Luo, Y Chen - Applied Intelligence, 2025 - Springer
As web attacks have recently increased in number and sophistication, traditional machine
learning methods have struggled to defend against well-designed attacks. Therefore, deep …

Time-Specific Integrity Service in MQTT Protocol

H Yan, H Hu, Q Ye - 2024 23rd ACM/IEEE International …, 2024 - ieeexplore.ieee.org
Message Queuing Telemetry Transport (MQTT) is a classic transmission protocol in IoT
scenarios, where a subscriber subscribes to the messages, and a publisher publishes the …

Insights into anomaly-based intrusion detection systems usability. A case study using real http requests

J Diaz-Verdejo, R Estepa, AE Alonso… - European …, 2024 - dl.acm.org
Intrusion detection systems based on anomalies (A-IDS) are crucial for detecting
cyberattacks, especially zero-day attacks. Numerous A-IDS proposals in the literature report …

Fusion Sec-IoT: A Federated Learning-Based Intrusion Detection System for Enhancing Security in IoT Networks.

JP Singh, R Kazmi - International Journal of Advanced …, 2024 - search.ebscohost.com
Abstract Internet of Things (IoT) has become one of the most significant technological
advancements of the modern era, which has impacted multiple sectors in the way it provides …

Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development

J Diaz-Verdejo, R Estepa Alonso… - European …, 2024 - dl.acm.org
The development of anomaly-based intrusion detection systems is hindered by the scarcity
of adequate datasets. An ideal dataset should contain real traffic, genuine attacks and cover …

Securing the Internet of Things (IoT) Environment Using Bio-Inspired Meta-Heuristic Methodologies

P Harikrishna, R Kaviarasan… - AI and IoT Technology …, 2024 - taylorfrancis.com
In the present digital era, the Internet of Things (IoT) has gained significant traction in the
divergent fields of constructing smart cities, agriculture, medicine, handheld devices and …

Design of Realtime Web Application Firewall on Deep Learning-Based to Improve Web Application Security

RZ Muttaqin, D Sudiana - Jurnal Penelitian Pendidikan IPA, 2024 - jppipa.unram.ac.id
Web applications are widely used nowadays, but comprises several vulnerabilities that are
often used by attacker to exploit the system. There is web application firewall (WAF) that …