The accelerating spread of junk food consumption is progressively putting the younger generations at risk of obesity. The concept of health prioritization is deeply rooted in the development of nurturing and general w...
详细信息
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ...
详细信息
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational data, systems, computers, and networks from unauthorized access. However, the incressing prevalence of insider threats and so...
详细信息
ISBN:
(纸本)9798350395914
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational data, systems, computers, and networks from unauthorized access. However, the incressing prevalence of insider threats and social engineering attack (SEA) presents significant challenges in effectively detecting and mitigating of these risks. A yearly report from 2023 highlighted that despite 90% of companies implementing multiple security measures, they still experienced an average loss of 16 million per incident. The detection capabilities of existing detection methods, which are primarily network-based or host-based intrusion detection, have limitations. This article aims to enhance detection methods through a comprehensive analysis of network and host level insiders' behavior along with Deep Learning approaches. This proposed method of detection provide a unified and holistic detection. Insider threats, whether intentional or unintentional, also create vulnerabilities to external threats and attacks such as phishing and SEA attacks. By addressing the gap in insider threat detection, the proposed comprehensive analysis of insider network and host level activities will enhance detection performance and reduce security costs by compact the existing fragmented detection approaches. As a result the false positive and false negative alarms will reduce the cost of detection and mitigate business operation disturbances. Since insiders interact with network devices and computers as users, integrating their host and network behaviors' into the detection methods offer both enhanced detection capabilities and a unified detection. To evaluate the proposed detection method, an Auto-encoder Deep Learning model will be developed, and public network and host intrusion detesets will be utilized. Evaluation metrics such as Accuracy, precision, recall, and F1- score will be employed. Preliminary analysis results have shown the proposed compre-hensive behavior analysis with Deep Learning (DL)
This paper explores the application of vision-based hand gesture recognition in addressing communication challenges faced by deaf and dumb individuals within the realm of human-computer interaction (HCI). Highlighting...
详细信息
The data transfer and communication happening between the client and server or the source to destination should be made in some secure way. It must be protected and authenticated. the passwords related to that all wil...
详细信息
In the contemporary digital realm, the utilization of online services has surged, facilitated by the seamless integration of deep learning technology, which is paramount in applications demanding precision and efficie...
详细信息
In today's world, connectivity and performance-driven technology are rapidly advancing each year, and new platforms and mechanisms are being utilized to enhance the security and performance of databases and cloud ...
详细信息
Vehicular Ad Hoc Networks (VANETs) are important for intelligent transportation systems, permitting vehicles to communicate with one another and nearby infrastructure in order to enhance road safety, traffic managemen...
详细信息
Biomedical Named Entity Recognition (BioNER) plays a crucial role in automatically identifying specific categories of entities from biomedical texts. Currently, region-based methods have shown promising performance in...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to *** authentication works via OpenID,Kerberos,password authentication protocols,***,there are still some limitations present in the reported security *** this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern *** proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and *** first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication *** Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing *** study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and *** experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via *** proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.
暂无评论