Deep learning trends and future perspectives of web security and vulnerabilities

被引:1
作者
Chughtai, Muhammad Saad [1 ]
Bibi, Irfana [2 ]
Karim, Shahid [3 ,4 ]
Shah, Syed Wajid Ali [5 ]
Laghari, Asif Ali [6 ]
Khan, Abdullah Ayub [6 ]
机构
[1] Barani Inst Management Sci, Dept Comp Sci, Rawalpindi, Pakistan
[2] Univ Punjab, Fac Comp & Informat Technol, Dept Comp Sci, Lahore, Pakistan
[3] ILMA Univ, Fac Sci & Technol, Karachi, Pakistan
[4] Northwestern Polytech Univ Shenzhen, Res & Dev Inst, Shenzhen 518057, Peoples R China
[5] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic 3220, Australia
[6] Sindh Madressatul Islam Univ, Dept Comp Sci, Karachi, Pakistan
关键词
Web security; vulnerabilities; E-commerce; cyber-attacks; deep learning; INTRUSION DETECTION SYSTEM; CYBER SECURITY; SITUATION; FRAMEWORK; ATTACKS; AWARENESS; MODEL; ALGORITHMS;
D O I
10.3233/JHS-230037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.
引用
收藏
页码:115 / 146
页数:32
相关论文
共 188 条
  • [91] Ma J, 2009, KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P1245
  • [92] On Security Issues in Web Applications through Cross Site Scripting (XSS)
    Malviya, Vikas K.
    Saurav, Saket
    Gupta, Atul
    [J]. 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 583 - 588
  • [93] Mamadhan S, 2012, INT CONF INTELL SYST, P240, DOI 10.1109/ISDA.2012.6416544
  • [94] Application of deep learning to cybersecurity: A survey
    Mandavifar, Samaneh
    Ghorbani, Ali A.
    [J]. NEUROCOMPUTING, 2019, 347 : 149 - 176
  • [95] Manjusha R., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P1043, DOI 10.1109/ICRTIT.2011.5972310
  • [96] Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey
    Mao, Qian
    Hu, Fei
    Hao, Qi
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2595 - 2621
  • [97] Mao ZQ, 2009, LECT NOTES COMPUT SC, V5628, P238
  • [98] Marashdih AW, 2016, INT J ADV COMPUT SC, V7, P155
  • [99] Stacked Convolutional Auto-Encoders for Hierarchical Feature Extraction
    Masci, Jonathan
    Meier, Ueli
    Ciresan, Dan
    Schmidhuber, Juergen
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2011, PT I, 2011, 6791 : 52 - 59
  • [100] Feature Selection Algorithms in Intrusion Detection System: A Survey
    Maza, Sofiane
    Touahria, Mohamed
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (10): : 5079 - 5099