Deep learning trends and future perspectives of web security and vulnerabilities

被引:1
作者
Chughtai, Muhammad Saad [1 ]
Bibi, Irfana [2 ]
Karim, Shahid [3 ,4 ]
Shah, Syed Wajid Ali [5 ]
Laghari, Asif Ali [6 ]
Khan, Abdullah Ayub [6 ]
机构
[1] Barani Inst Management Sci, Dept Comp Sci, Rawalpindi, Pakistan
[2] Univ Punjab, Fac Comp & Informat Technol, Dept Comp Sci, Lahore, Pakistan
[3] ILMA Univ, Fac Sci & Technol, Karachi, Pakistan
[4] Northwestern Polytech Univ Shenzhen, Res & Dev Inst, Shenzhen 518057, Peoples R China
[5] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic 3220, Australia
[6] Sindh Madressatul Islam Univ, Dept Comp Sci, Karachi, Pakistan
关键词
Web security; vulnerabilities; E-commerce; cyber-attacks; deep learning; INTRUSION DETECTION SYSTEM; CYBER SECURITY; SITUATION; FRAMEWORK; ATTACKS; AWARENESS; MODEL; ALGORITHMS;
D O I
10.3233/JHS-230037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.
引用
收藏
页码:115 / 146
页数:32
相关论文
共 188 条
  • [1] Abusaimeh H, 2012, INT J COMPUT SCI NET, V12, P67
  • [2] Agrawal R, 2003, VLDB J, V12, P157, DOI [10.1007/s00778-003-0097-x, 10.1007/s000778-003-0097-x]
  • [3] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [4] Improving risk assessment model of cyber security using fuzzy logic inference system
    Alali, Mansour
    Almogren, Ahmad
    Hassan, Mohammad Mehedi
    Rassan, Iehab A. L.
    Bhuiyan, Md Zakirul Alam
    [J]. COMPUTERS & SECURITY, 2018, 74 : 323 - 339
  • [5] Ali S., 2009, EUR J SCI RES, V38, P604
  • [6] A Survey of Machine Learning for Big Code and Naturalness
    Allamanis, Miltiadis
    Barr, Earl T.
    Devanbu, Premkumar
    Sutton, Charles
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [7] Almutairi A.A., WEB SECURITY EMERGIN
  • [8] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [9] [Anonymous], 2014, INT J INNOV RES COMP
  • [10] Appiah V., 2017, INT J APPL INF SYST, V12, P868