Popereshnyak, S. та Ovcharenko, V. та Novikov, Y. та Hulak, Hennadii (2024) Detection of intrusions based on text analysis and machine learning methods in the development of information systems Cybersecurity Providing in Information and Telecommunication Systems II 2024, 3826. с. 310-318. ISSN 1613-0073
Текст
S_Popereshnyak_V_Ovcharenko_Y_Novikov_H_Hulak_CPITS_2024_3826.pdf Download (2MB) |
Анотація
The paper analyzes the main concepts of cyber security, and cyber security technologies, investigates the features of the use of artificial intelligence in cyber security, analyzes the applied methods of machine learning, and presents the results of experimental research on the application of machine learning methods in cyber security. In this work, a host intrusion detection system based on the technique of intelligent text analysis will be implemented. The work describes the difficulties that data sources may face, for example, suffering from the method of complex functions. The paper proposes a classification of methods for detecting SQL injection, XSS, and path traversal attacks, and also provides performance measurements for the specified models. Penetration testing methodology was applied. This technique detects vulnerabilities related to the most popular attacks, such as SQL injection (SQLi), cross-site scripting (XSS), and sensitive data disclosure. Security solutions and suggestions were presented that IT administrators can use as a guide to protect the system against cybercriminal threats. Thus, the effectiveness of the proposed system was substantiated by fixing all detected vulnerabilities to achieve basic security standards. A host-based intrusion detection system (HIDS) was developed using text analysis techniques.
Тип елементу : | Стаття |
---|---|
Ключові слова: | cybersecurity; attack; smart home; Internet of Things; machine learning; host; cybercrime; risk; threat; software |
Типологія: | Статті у базах даних > Scopus |
Підрозділи: | Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка |
Користувач, що депонує: | Павло Миколайович Складанний |
Дата внесення: | 06 Груд 2024 08:45 |
Останні зміни: | 06 Груд 2024 08:45 |
URI: | https://elibrary.kubg.edu.ua/id/eprint/50180 |
Actions (login required)
Перегляд елементу |