• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种使用改进鲸鱼优化算法的用于网络攻击检测的新型优化神经网络模型。

A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm.

作者信息

Jyothi Koganti Krishna, Borra Subba Reddy, Srilakshmi Koganti, Balachandran Praveen Kumar, Reddy Ganesh Prasad, Colak Ilhami, Dhanamjayulu C, Chinthaginjala Ravikumar, Khan Baseem

机构信息

Department of Computer Science and Engineering, Geethanjali College of Engineering and Technology, Hyderabad, TS, 501301, India.

Department of Information Technology, Malla Reddy Engineering College for Women, Hyderabad, TS, India.

出版信息

Sci Rep. 2024 Mar 7;14(1):5590. doi: 10.1038/s41598-024-55098-2.

DOI:10.1038/s41598-024-55098-2
PMID:38453945
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11310511/
Abstract

Cybersecurity is critical in today's digitally linked and networked society. There is no way to overestimate the importance of cyber security as technology develops and becomes more pervasive in our daily lives. Cybersecurity is essential to people's protection. One type of cyberattack known as "credential stuffing" involves using previously acquired usernames and passwords by attackers to access user accounts on several websites without authorization. This is feasible as a lot of people use the same passwords and usernames on several different websites. Maintaining the security of online accounts requires defence against credential-stuffing attacks. The problems of credential stuffing attacks, failure detection, and prediction can be handled by the suggested EWOA-ANN model. Here, a novel optimization approach known as Enhanced Whale Optimization Algorithm (EWOA) is put on to train the neural network. The effectiveness of the suggested attack identification model has been demonstrated, and an empirical comparison will be carried out with respect to specific security analysis.

摘要

在当今数字化连接和网络化的社会中,网络安全至关重要。随着技术的发展并在我们的日常生活中变得更加普及,网络安全的重要性无论怎样高估都不为过。网络安全对于人们的保护至关重要。一种被称为“凭证填充”的网络攻击类型,涉及攻击者使用先前获取的用户名和密码未经授权访问多个网站上的用户账户。由于很多人在多个不同网站上使用相同的密码和用户名,所以这是可行的。维护在线账户的安全需要抵御凭证填充攻击。所提出的EWOA-ANN模型可以处理凭证填充攻击、故障检测和预测等问题。在此,一种称为增强鲸鱼优化算法(EWOA)的新型优化方法被用于训练神经网络。所提出的攻击识别模型的有效性已经得到证明,并且将针对具体的安全分析进行实证比较。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/93e29fd2e0e5/41598_2024_55098_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/a1288c8e6414/41598_2024_55098_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/e2f9c75341f1/41598_2024_55098_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/fe05ac4c79de/41598_2024_55098_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/93e29fd2e0e5/41598_2024_55098_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/a1288c8e6414/41598_2024_55098_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/e2f9c75341f1/41598_2024_55098_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/fe05ac4c79de/41598_2024_55098_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6eb0/11310511/93e29fd2e0e5/41598_2024_55098_Fig4_HTML.jpg

相似文献

1
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm.一种使用改进鲸鱼优化算法的用于网络攻击检测的新型优化神经网络模型。
Sci Rep. 2024 Mar 7;14(1):5590. doi: 10.1038/s41598-024-55098-2.
2
Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).医院网络安全风险与差距:综述(面向非网络专业人员)
Front Digit Health. 2022 Aug 11;4:862221. doi: 10.3389/fdgth.2022.862221. eCollection 2022.
3
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
4
Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.衡量沙特阿拉伯网络犯罪方面的网络安全意识水平。
Heliyon. 2021 Jan 25;7(1):e06016. doi: 10.1016/j.heliyon.2021.e06016. eCollection 2021 Jan.
5
Cyber-attack method and perpetrator prediction using machine learning algorithms.使用机器学习算法进行网络攻击方法及作案者预测
PeerJ Comput Sci. 2021 Apr 9;7:e475. doi: 10.7717/peerj-cs.475. eCollection 2021.
6
Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system.利用蜘蛛猴优化算法优化神经网络进行入侵检测系统。
Sci Rep. 2024 Jul 26;14(1):17196. doi: 10.1038/s41598-024-68342-6.
7
A deeper look into cybersecurity issues in the wake of Covid-19: A survey.新冠疫情后对网络安全问题的深入研究:一项调查。
J King Saud Univ Comput Inf Sci. 2022 Nov;34(10):8176-8206. doi: 10.1016/j.jksuci.2022.08.003. Epub 2022 Aug 11.
8
Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.基于深度神经网络的物联网架构开发,以应对自动化引导车辆的网络攻击。
Sensors (Basel). 2021 Dec 18;21(24):8467. doi: 10.3390/s21248467.
9
Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.应用强化学习增强对抗性模拟的网络安全防御
Sensors (Basel). 2023 Mar 10;23(6):3000. doi: 10.3390/s23063000.
10
A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.用于分析和优化缓解对网络物理系统的网络威胁的贝叶斯框架。
Risk Anal. 2022 Oct;42(10):2275-2290. doi: 10.1111/risa.13900. Epub 2022 Mar 1.

引用本文的文献

1
An innovative Squid Game Optimizer for enhanced channel estimation and massive MIMO detection using dilated adaptive RNNs.一种创新的鱿鱼游戏优化器,用于使用扩张自适应循环神经网络增强信道估计和大规模多输入多输出检测。
Sci Rep. 2025 Aug 29;15(1):31921. doi: 10.1038/s41598-025-16899-1.
2
Leveraging data analytics to revolutionize cybersecurity with machine learning and deep learning.利用数据分析,借助机器学习和深度学习彻底变革网络安全。
Sci Rep. 2025 Aug 29;15(1):31910. doi: 10.1038/s41598-025-16932-3.
3
(IoT) Network intrusion detection system using optimization algorithms.

本文引用的文献

1
Author Correction: Detection of Ponzi scheme on Ethereum using machine learning algorithms.作者更正:使用机器学习算法检测以太坊上的庞氏骗局。
Sci Rep. 2023 Nov 28;13(1):20952. doi: 10.1038/s41598-023-48310-2.
2
A deeper look into cybersecurity issues in the wake of Covid-19: A survey.新冠疫情后对网络安全问题的深入研究:一项调查。
J King Saud Univ Comput Inf Sci. 2022 Nov;34(10):8176-8206. doi: 10.1016/j.jksuci.2022.08.003. Epub 2022 Aug 11.
3
State-of-the-art in artificial neural network applications: A survey.人工神经网络应用的最新进展:一项综述。
使用优化算法的(物联网)网络入侵检测系统
Sci Rep. 2025 Jul 1;15(1):21706. doi: 10.1038/s41598-025-04638-5.
4
Enhancing cybersecurity through script development using machine and deep learning for advanced threat mitigation.通过使用机器学习和深度学习进行脚本开发来增强网络安全,以缓解高级威胁。
Sci Rep. 2025 Mar 10;15(1):8297. doi: 10.1038/s41598-025-92676-4.
5
Prediction of android ransomware with deep learning model using hybrid cryptography.使用混合加密技术的深度学习模型预测安卓勒索软件
Sci Rep. 2024 Sep 27;14(1):22351. doi: 10.1038/s41598-024-70544-x.
Heliyon. 2018 Nov 23;4(11):e00938. doi: 10.1016/j.heliyon.2018.e00938. eCollection 2018 Nov.