Your browser doesn't support javascript.
loading
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm.
Jyothi, Koganti Krishna; Borra, Subba Reddy; Srilakshmi, Koganti; Balachandran, Praveen Kumar; Reddy, Ganesh Prasad; Colak, Ilhami; Dhanamjayulu, C; Chinthaginjala, Ravikumar; Khan, Baseem.
  • Jyothi KK; Department of Computer Science and Engineering, Geethanjali College of Engineering and Technology, Hyderabad, TS, 501301, India.
  • Borra SR; Department of Information Technology, Malla Reddy Engineering College for Women, Hyderabad, TS, India.
  • Srilakshmi K; Department of Electrical and Electronics Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, TS, 501301, India.
  • Balachandran PK; Department of Electrical and Electronics Engineering, Vardhaman College of Engineering, Hyderabad, TS, 501218, India.
  • Reddy GP; Department of Electrical and Electronics Engineering, AM Reddy Memeorial College of Engineering, Guntur, AP, India.
  • Colak I; Department of Electrical and Electronics Engineering, Faculty of Engineering and Architectures, Nisantasi University, 34398, Istanbul, Turkey.
  • Dhanamjayulu C; School of Electronics Engineering, Vellore Institute of Technology, Vellore, India. dhanamjayulu.c@vit.ac.in.
  • Chinthaginjala R; School of Electronics Engineering, Vellore Institute of Technology, Vellore, India.
  • Khan B; Department of Electrical and Computer Engineering, Hawassa University, Hawassa 05, Ethiopia. baseemkh@hu.edu.et.
Sci Rep ; 14(1): 5590, 2024 Mar 07.
Article en En | MEDLINE | ID: mdl-38453945
ABSTRACT
Cybersecurity is critical in today's digitally linked and networked society. There is no way to overestimate the importance of cyber security as technology develops and becomes more pervasive in our daily lives. Cybersecurity is essential to people's protection. One type of cyberattack known as "credential stuffing" involves using previously acquired usernames and passwords by attackers to access user accounts on several websites without authorization. This is feasible as a lot of people use the same passwords and usernames on several different websites. Maintaining the security of online accounts requires defence against credential-stuffing attacks. The problems of credential stuffing attacks, failure detection, and prediction can be handled by the suggested EWOA-ANN model. Here, a novel optimization approach known as Enhanced Whale Optimization Algorithm (EWOA) is put on to train the neural network. The effectiveness of the suggested attack identification model has been demonstrated, and an empirical comparison will be carried out with respect to specific security analysis.
Palabras clave

Texto completo: 1 Banco de datos: MEDLINE Idioma: En Año: 2024 Tipo del documento: Article

Texto completo: 1 Banco de datos: MEDLINE Idioma: En Año: 2024 Tipo del documento: Article