Deep learning trends and future perspectives of web security and vulnerabilities

被引:1
作者
Chughtai, Muhammad Saad [1 ]
Bibi, Irfana [2 ]
Karim, Shahid [3 ,4 ]
Shah, Syed Wajid Ali [5 ]
Laghari, Asif Ali [6 ]
Khan, Abdullah Ayub [6 ]
机构
[1] Barani Inst Management Sci, Dept Comp Sci, Rawalpindi, Pakistan
[2] Univ Punjab, Fac Comp & Informat Technol, Dept Comp Sci, Lahore, Pakistan
[3] ILMA Univ, Fac Sci & Technol, Karachi, Pakistan
[4] Northwestern Polytech Univ Shenzhen, Res & Dev Inst, Shenzhen 518057, Peoples R China
[5] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic 3220, Australia
[6] Sindh Madressatul Islam Univ, Dept Comp Sci, Karachi, Pakistan
关键词
Web security; vulnerabilities; E-commerce; cyber-attacks; deep learning; INTRUSION DETECTION SYSTEM; CYBER SECURITY; SITUATION; FRAMEWORK; ATTACKS; AWARENESS; MODEL; ALGORITHMS;
D O I
10.3233/JHS-230037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.
引用
收藏
页码:115 / 146
页数:32
相关论文
共 188 条
  • [101] A portal for software security
    Mead, NR
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (04) : 75 - 79
  • [102] Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
    Medeiros, Iberia
    Neves, Nuno
    Correia, Miguel
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (01) : 54 - 69
  • [103] Mei JJ, 2009, PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, P1411, DOI 10.1109/ITNG.2009.34
  • [104] Meneely A, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P453
  • [105] Mingyi Zhu, 2018, Network and Parallel Computing. 15th IFIP WG 10.3 International Conference, NPC 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11276), P137, DOI 10.1007/978-3-030-05677-3_13
  • [106] A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
    Mishra, Preeti
    Varadharajan, Vijay
    Tupakula, Uday
    Pilli, Emmanuel S.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 686 - 728
  • [107] Mittal S., 2019, arXiv
  • [108] Deep Learning for IoT Big Data and Streaming Analytics: A Survey
    Mohammadi, Mehdi
    Al-Fuqaha, Ala
    Sorour, Sameh
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2923 - 2960
  • [109] Mohammed I.A, 2020, ARTIF INTELL-AMST, V7
  • [110] Moosa A., 2010, INT J COMPUT INF ENG, V4, P610