Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors
-
Published:2023-04-12
Issue:
Volume:
Page:90-105
-
ISSN:2581-6942
-
Container-title:International Journal of Case Studies in Business, IT, and Education
-
language:en
-
Short-container-title:IJCSBE
Author:
R. Manasa1, Jayanthila Devi A.2
Affiliation:
1. Research Scholar, Institute of Computer Science and Information Science, Srinivas University, Mangalore, India 2. Professor, Institute of Computer Science & Information Science, Srinivas University, Mangalore – 575001, India
Abstract
Purpose: Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do malicious actions on digital systems or networks in order to make a profit. These crimes include hacking computer systems and stealing confidential information from businesses and individuals. A thorough study on the algorithms to detect threats in the virtual world of corporate sectors.
Finding/Result: Researchers are using a wide array of deep learning algorithms to achieve this goal, and the results have been rather impressive. A system like this may provide substandard results because to its limited ability to describe the problem area and the complexity of its modeling of hazardous behaviours. Supervised learning systems often deliver a high level of accuracy because of the large amount of data made available by manually labelled samples.
Originality/Value: Antivirus software is an absolute need for any and all computers. The vast majority of antivirus software is able to identify malicious software such as malware, spyware, ransomware, and harmful email attachments.
Paper Type: Literature Review.
Publisher
Srinivas University
Reference133 articles.
1. Casey, P., Baggili, I., & Yarramreddy, A. (2019). Immersive virtual reality attacks and the human joystick. IEEE Transactions on Dependable and Secure Computing, 18(2), 550-562. 2. Imperatori, C., Dakanalis, A., Farina, B., Pallavicini, F., Colmegna, F., Mantovani, F., & Clerici, M. (2020).Global storm of stress-related psychopathological symptoms: a brief overview on the usefulness of virtual reality in facing the mental health impact of COVID-19. Cyberpsychology, Behavior, and Social Networking, 23(11), 782-788. 3. Alzahrani, S., & Hong, L. (2018). Generation of DDoS attack dataset for effective IDS development and evalation. Journal of Information Security, 9(4), 225-241. 4. Rawashdeh, A., Alkasassbeh, M., & Al-Hawawreh, M. (2018). An anomaly-based approach for DDoS attack detection in cloud environment. International Journal of Computer Applications in Technology, 57(4), 312-324. 5. Liu11, X., Sohn, Y. H., & Park, D. W. (2018). Application development with augmented reality technique using Unity 3D and Vuforia. International Journal of Applied Engineering Research, 13(21), 15068-15071. .
|
|