Deep learning trends and future perspectives of web security and vulnerabilities

被引:1
作者
Chughtai, Muhammad Saad [1 ]
Bibi, Irfana [2 ]
Karim, Shahid [3 ,4 ]
Shah, Syed Wajid Ali [5 ]
Laghari, Asif Ali [6 ]
Khan, Abdullah Ayub [6 ]
机构
[1] Barani Inst Management Sci, Dept Comp Sci, Rawalpindi, Pakistan
[2] Univ Punjab, Fac Comp & Informat Technol, Dept Comp Sci, Lahore, Pakistan
[3] ILMA Univ, Fac Sci & Technol, Karachi, Pakistan
[4] Northwestern Polytech Univ Shenzhen, Res & Dev Inst, Shenzhen 518057, Peoples R China
[5] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic 3220, Australia
[6] Sindh Madressatul Islam Univ, Dept Comp Sci, Karachi, Pakistan
关键词
Web security; vulnerabilities; E-commerce; cyber-attacks; deep learning; INTRUSION DETECTION SYSTEM; CYBER SECURITY; SITUATION; FRAMEWORK; ATTACKS; AWARENESS; MODEL; ALGORITHMS;
D O I
10.3233/JHS-230037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.
引用
收藏
页码:115 / 146
页数:32
相关论文
共 188 条
  • [71] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    [J]. COMPUTER NETWORKS, 2021, 188
  • [72] Development of cyber information security education and training system
    Kim, Bong-Hyun
    Kim, Ki-Chan
    Hong, Sung-Eon
    Oh, Sang-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 6051 - 6064
  • [73] Kirda E., 2006, Applied Computing 2006. 21st Annual ACM Symposium on Applied Computing, P330, DOI 10.1145/1141277.1141357
  • [74] Kolter J.Z., 2004, Proceedings of Knowledge Discovery and Data mining, P470
  • [75] Kumar R., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P1294, DOI 10.1109/WICT.2011.6141435
  • [76] Kumar S, 2017, INT CONF RELI INFO, P451, DOI 10.1109/ICRITO.2017.8342469
  • [77] A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon
    Kim, Hyunjoo
    Kim, Jinoh
    Suh, Sang C.
    Kim, Ikkyun
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961
  • [78] Cybersecurity for Industry 4.0 in the current literature: A reference framework
    Lezzi, Marianna
    Lazoi, Mariangela
    Corallo, Angelo
    [J]. COMPUTERS IN INDUSTRY, 2018, 103 : 97 - 110
  • [79] Li DY, 2013, 2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), P569, DOI 10.1109/ICNC.2013.6818041
  • [80] A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
    Li, Yuchong
    Liu, Qinghui
    [J]. ENERGY REPORTS, 2021, 7 : 8176 - 8186