IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks

Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks
View Sample PDF
Author(s): Sarabjeet Kaur Kochhar (Indraprastha College for Women, University of Delhi, Delhi, India), Anishka Bhatia (Indraprastha College for Women, University of Delhi, Delhi, India)and Nandini Tomer (Indraprastha College for Women, University of Delhi, Delhi, India)
Copyright: 2023
Pages: 33
Source title: New Approaches to Data Analytics and Internet of Things Through Digital Twin
Source Author(s)/Editor(s): P. Karthikeyan (National Chung Cheng University, Chiayi, Taiwan), Polinpapilinho F. Katina (University of South Carolina Upstate, USA)and S.P. Anandaraj (Presidency University, India)
DOI: 10.4018/978-1-6684-5722-1.ch008

Purchase

View Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks on the publisher's website for pricing and purchasing information.

Abstract

This chapter acquaints the reader to the terms and terminologies of cyber-attacks, cybersecurity, big data, data analytics, and related new age technologies, including deep learning. The types of cyber-attacks, how they become special and different within the big data analytic frameworks, a multi-layer framework for their detection, and the challenges therein are detailed next. Thereafter, an extensive review of some research works has been undertaken to provide an in-depth insight to the various cyber security detection systems using the new age technologies such as naive Bayesian networks in intrusion detection systems, deep learning in Android malware detection, and intelligent malware detection, etc. Conclusions have been drawn from these studies to establish that the emerging technologies, like artificial intelligence, machine learning, deep learning, and internet of Things, are the need of the hour to assist organizations in navigating the increasingly aggressive cyber threat landscape.

Related Content

N. Geethanjali, K. M. Ashifa, Avantika Raina, Jayashree Patil, Rameshwaran Byloppilly, S. Suman Rajest. © 2024. 19 pages.
Praveen Kakada, Muhammed Shafi M. K.. © 2024. 14 pages.
P. S. Venkateswaran, Divya Marupaka, Sachin Parate, Amit Bhanushali, Latha Thammareddi, P. Paramasivan. © 2024. 15 pages.
M. Lishmah Dominic, P. S. Venkateswaran, Latha Thamma Reddi, Sandeep Rangineni, R. Regin, S. Suman Rajest. © 2024. 15 pages.
S. Sivabala, P. Vidyasri. © 2024. 23 pages.
H. Hajra, G. Jayalakshmi. © 2024. 22 pages.
Anusha Thakur. © 2024. 15 pages.
Body Bottom