Review on Deep Learning based Network Security Tools in Detecting Real-Time Vulnerabilities

نویسندگان

چکیده

Network connected hardware and software systems are always open to vulnerabilities when they with an outdated firewall or unknown Wi-Fi access. Therefore network based anti-virus intrusion detection widely installed in every hardwares. However, the pre-installed security softwares not quite capable identifying attacks evolved. Similarly, traditional tools that available current market efficient handling system is a cloud environment IoT network. Hence, recent algorithms of incorporated deep learning for improving its rate. The adaptability comparatively high over it employed feedback connections included networks produce response signal their own as training work performances. This improves performances learning-based while real-time operation. motive review present attainments vulnerability models along limitations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Overlapping Communities in Social Networks using Deep Learning

In network analysis, a community is typically considered of as a group of nodes with a great density of edges among themselves and a low density of edges relative to other network parts. Detecting a community structure is important in any network analysis task, especially for revealing patterns between specified nodes. There is a variety of approaches presented in the literature for overlapping...

متن کامل

Rule-Based Source-Code Analysis For Detecting Security Vulnerabilities

Many security vulnerabilities related to source code have simple syntactic patterns or flow patterns that can be described as rules. In this paper, we propose a rule description language, RDL, in which we can specify simple syntactic patterns and data-flow and control-flow patterns that possibly lead to security vulnerabilities. We then introduce a universal static detector that can find the lo...

متن کامل

Deep learning-based CAD systems for mammography: A review article

Breast cancer is one of the most common types of cancer in women. Screening mammography is a low‑dose X‑ray examination of breasts, which is conducted to detect breast cancer at early stages when the cancerous tumor is too small to be felt as a lump. Screening mammography is conducted for women with no symptoms of breast cancer, for early detection of cancer when the cancer is most treatable an...

متن کامل

Modeling Security Vulnerabilities in Learning Management Systems

In many educational institutes, learning management systems are essential parts of delivering class materials not only for on-line courses but also on-campus classes. The primary purpose of learning management system is to provide proper virtual educational environments and convenient communicational channels between instructors and students letting them to overcome the barrier of time and spac...

متن کامل

Detecting Security Vulnerabilities in C code with Type Checking

An emerging trend in programming language design is to allow for more properties about values and computations to be expressed in the language so that they can be checked automatically. This paper presents a flow-sensitive type checking algorithm for a type system of type qualifiers. We show that our type checker can detect common programming errors that often result in security vulnerabilities...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Ubiquitous Computing and Communication Technologies

سال: 2022

ISSN: ['2582-337X']

DOI: https://doi.org/10.36548/jucct.2021.4.005